CVE-2023-53452Race Condition in Linux

Severity
4.7MEDIUMNVD
EPSS
0.0%
top 98.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential race condition between napi_init and napi_enable A race condition can happen if netdev is registered, but NAPI isn't initialized yet, and meanwhile user space starts the netdev that will enable NAPI. Then, it hits BUG_ON(): kernel BUG at net/core/dev.c:6423! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 417 Comm: iwd Not tainted 6.2.7-slab-dirty #3 eb0f5a8a9d91 Hardware name: LENOVO 21DL/L

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.166.1.28+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linuxe3ec7017f6a20d12ddd9fe23d345ebb7b8c104dd39712c8aeb79691bcec8bd6ff658cde1651e0803+4
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53452: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential race condition between napi_init and napi_enable A race2025-10-01
GHSA
GHSA-77qf-55vf-5v3v: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential race condition between napi_init and napi_enable A ra2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: wifi: rtw89: fix potential race condition between napi_init and napi_enable2025-10-01
Debian
CVE-2023-53452: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89...2023