
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's rtlwifi driver has been identified as CVE-2024-53190. The issue affects the efuse read procedure in the rtl8192cu driver, specifically during the probe of Realtek USB WiFi adapters. The vulnerability was discovered and reported by Syzkaller in August 2024 (Kernel Git).
The vulnerability stems from an inefficient I/O read retry mechanism in the rtlwifi driver. During the probe of rtl8192cu devices, the read_efuse() function calls read_efuse_byte() multiple times (up to 512 iterations) with each call attempting I/O reads up to 10,000 times in case of failures. In USB devices, which have inherently slower transfer speeds, this leads to significant delays with each retry loop taking approximately 15 seconds (Kernel Git).
The vulnerability can cause the driver to become stuck in its probe routine for extended periods, leading to system unresponsiveness. This manifests as a hung task condition, particularly noticeable during system reboot attempts. The issue affects the kernel's ability to properly handle USB WiFi adapter initialization (Kernel Git).
The issue has been patched by reducing the number of I/O read retry attempts from 10,000 to 10 for USB devices specifically. This fix has been implemented in the Linux kernel and backported to stable kernel versions 6.x and later. The patch maintains the original retry count for PCIe devices while significantly improving responsiveness for USB devices (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."