-
CVE-2023-53199
- EPSS 0.03%
- Veröffentlicht 15.09.2025 14:21:27
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails Syzkaller detected a memory leak of skbs in ath9k_hif_usb_rx_stream(). While processing skbs in ath9k_hif_usb_rx_stream(), the already allocated skbs in skb_pool are not freed if ath9k_hif_usb_rx_stream() fails. If we have an incorrect pkt_len or pkt_tag, the input skb is considered invalid and dropped. All the associated packets already in skb_pool should be dropped and freed. Added a comment describing this issue. The patch also makes remain_skb NULL after being processed so that it cannot be referenced after potential free. The initialization of hif_dev fields which are associated with remain_skb (rx_remain_len, rx_transfer_len and rx_pad_len) is moved after a new remain_skb is allocated. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
3fc6401fafde11712a83089fa2cc874cfd10e2cd
Version
44b23b488d44e56d467764ecb661830e5b02b308
Status
affected
Version <
cd8316767099920a5d41feed1afab0c482a43e9f
Version
44b23b488d44e56d467764ecb661830e5b02b308
Status
affected
Version <
f26dd69f61eff2eedf5df2d199bdd23108309947
Version
44b23b488d44e56d467764ecb661830e5b02b308
Status
affected
Version <
61490d2710277e8a55009b7682456ae22f8087cf
Version
44b23b488d44e56d467764ecb661830e5b02b308
Status
affected
Version <
9acdec72787af1bc8ed92711b52118c8e3e638a2
Version
44b23b488d44e56d467764ecb661830e5b02b308
Status
affected
Version <
c766e37fccd5a5c5059be7efcd9618bf8a2c17c3
Version
44b23b488d44e56d467764ecb661830e5b02b308
Status
affected
Version <
0af54343a76263a12dbae7fafb64eb47c4a6ad38
Version
44b23b488d44e56d467764ecb661830e5b02b308
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.38
Status
affected
Version <
2.6.38
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.276
Status
unaffected
Version <=
5.4.*
Version
5.4.235
Status
unaffected
Version <=
5.10.*
Version
5.10.173
Status
unaffected
Version <=
5.15.*
Version
5.15.99
Status
unaffected
Version <=
6.1.*
Version
6.1.16
Status
unaffected
Version <=
6.2.*
Version
6.2.3
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|