CVE-2023-53430

Source
https://cve.org/CVERecord?id=CVE-2023-53430
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53430.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53430
Downstream
Published
2025-09-18T16:04:11.035Z
Modified
2026-02-21T07:17:11.160825Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
wifi: mt76: dma: fix memory leak running mt76_dma_tx_cleanup
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: dma: fix memory leak running mt76dmatx_cleanup

Fix device unregister memory leak and alway cleanup all configured rx queues in mt76dmatx_cleanup routine.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53430.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
52546e27787ed005413ac622ae9e4c3087100b50
Fixed
604990fee0a6d608a6cca179ae474f2a1c6add8a
Fixed
3f7dda36e0b6dfa2cd26191f754ba061ab8191f2

Affected versions

v6.*
v6.1
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53430.json"
vanir_signatures
[
    {
        "id": "CVE-2023-53430-0dced9b7",
        "target": {
            "file": "drivers/net/wireless/mediatek/mt76/dma.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@604990fee0a6d608a6cca179ae474f2a1c6add8a",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "280782143846468599739586638597096866681",
                "134577984813275830064349169489452196012",
                "171978766306405357159450813495363983542",
                "141819535013593958098515519028865614020",
                "55473364029063291344889272059733278293"
            ]
        },
        "signature_type": "Line"
    },
    {
        "id": "CVE-2023-53430-4f615150",
        "target": {
            "file": "drivers/net/wireless/mediatek/mt76/dma.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f7dda36e0b6dfa2cd26191f754ba061ab8191f2",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "280782143846468599739586638597096866681",
                "134577984813275830064349169489452196012",
                "171978766306405357159450813495363983542",
                "141819535013593958098515519028865614020",
                "55473364029063291344889272059733278293"
            ]
        },
        "signature_type": "Line"
    },
    {
        "id": "CVE-2023-53430-81008b60",
        "target": {
            "function": "mt76_dma_cleanup",
            "file": "drivers/net/wireless/mediatek/mt76/dma.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f7dda36e0b6dfa2cd26191f754ba061ab8191f2",
        "digest": {
            "function_hash": "251732672042361404163262452638126504720",
            "length": 797.0
        },
        "signature_type": "Function"
    },
    {
        "id": "CVE-2023-53430-c4115b8d",
        "target": {
            "function": "mt76_dma_cleanup",
            "file": "drivers/net/wireless/mediatek/mt76/dma.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@604990fee0a6d608a6cca179ae474f2a1c6add8a",
        "digest": {
            "function_hash": "251732672042361404163262452638126504720",
            "length": 797.0
        },
        "signature_type": "Function"
    }
]

Git / github.com/gregkh/linux

Affected ranges

Type
GIT
Repo
https://github.com/gregkh/linux
Events

Affected versions

v6.*
v6.2
v6.2.1
v6.2.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53430.json"