CVE-2023-53808
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: mwifiex: fix memory leak in mwifiex_histogram_read()
Always free the zeroed page on return from 'mwifiex_histogram_read()'.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in mwifiex_histogram_read() in the Linux kernel's wifi driver could lead to local resource exhaustion.
Vulnerability
The mwifiex_histogram_read() function in the Linux kernel's Marvell wifi driver had a memory leak on its return path [1][2][3][4]. When a zeroed page was allocated for histogram data but the function returned early (for example due to an error or EOF), the allocated page was not freed, causing the kernel to leak memory over repeated reads [1][2][3][4].
Exploitation
This vulnerability is exploitable by a local attacker who has access to the affected device's debugfs or procfs interfaces that invoke mwifiex_histogram_read(). No special privileges beyond the ability to read the histogram file are required [1][2][3][4]. By repeatedly reading this file, the attacker can trigger the memory leak, gradually consuming kernel memory [1][2][3][4].
Impact
Over time, the memory leak can deplete available kernel memory, potentially causing denial-of-service conditions such as system slowdowns, instability, or crashes [1][2][3][4]. The leak does not directly allow arbitrary code execution or privilege escalation, but it can degrade system performance and availability [1][2][3][4].
Mitigation
The fix was applied to multiple stable kernel branches [1][2][3][4] and ensures that the allocated page is freed on all return paths from mwifiex_histogram_read() [1][2][3][4]. Users should update their kernel to the latest stable version that includes the corresponding commit.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3Patches
9d3b53ac2b6027be90670b9678f717752f94e0c4240d23db5308eb3a609ac84081b4baafb5d66b32a6ecff76e1da838379c8fd72a5c2aVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/0c4240d23db525208fd40dd6371ca3254fa1b93dnvd
- git.kernel.org/stable/c/308eb3a609ac39ca9c3e466b35e8825007c8d826nvd
- git.kernel.org/stable/c/5d66b32a6ecf2e2e1a9523eaa4f8b314832fe06cnvd
- git.kernel.org/stable/c/7be90670b967d11f53a9d45bc88fa8ac9daf9709nvd
- git.kernel.org/stable/c/84081b4baafb49211193c6a056d5aee9c0e6ab8envd
- git.kernel.org/stable/c/8f717752f94efae84853e17f2589665c330a0cf5nvd
- git.kernel.org/stable/c/9c8fd72a5c2a031cbc680a2990107ecd958ffcdbnvd
- git.kernel.org/stable/c/d3b53ac2b60283f84bcc650aaa8af98500f37b56nvd
- git.kernel.org/stable/c/f76e1da838377777557d78dfeb6d8c532f7118benvd
News mentions
0No linked articles in our index yet.