-

CVE-2023-53199

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails

Syzkaller detected a memory leak of skbs in ath9k_hif_usb_rx_stream().
While processing skbs in ath9k_hif_usb_rx_stream(), the already allocated
skbs in skb_pool are not freed if ath9k_hif_usb_rx_stream() fails. If we
have an incorrect pkt_len or pkt_tag, the input skb is considered invalid
and dropped. All the associated packets already in skb_pool should be
dropped and freed. Added a comment describing this issue.

The patch also makes remain_skb NULL after being processed so that it
cannot be referenced after potential free. The initialization of hif_dev
fields which are associated with remain_skb (rx_remain_len,
rx_transfer_len and rx_pad_len) is moved after a new remain_skb is
allocated.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 3fc6401fafde11712a83089fa2cc874cfd10e2cd
Version 44b23b488d44e56d467764ecb661830e5b02b308
Status affected
Version < cd8316767099920a5d41feed1afab0c482a43e9f
Version 44b23b488d44e56d467764ecb661830e5b02b308
Status affected
Version < f26dd69f61eff2eedf5df2d199bdd23108309947
Version 44b23b488d44e56d467764ecb661830e5b02b308
Status affected
Version < 61490d2710277e8a55009b7682456ae22f8087cf
Version 44b23b488d44e56d467764ecb661830e5b02b308
Status affected
Version < 9acdec72787af1bc8ed92711b52118c8e3e638a2
Version 44b23b488d44e56d467764ecb661830e5b02b308
Status affected
Version < c766e37fccd5a5c5059be7efcd9618bf8a2c17c3
Version 44b23b488d44e56d467764ecb661830e5b02b308
Status affected
Version < 0af54343a76263a12dbae7fafb64eb47c4a6ad38
Version 44b23b488d44e56d467764ecb661830e5b02b308
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.38
Status affected
Version < 2.6.38
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.276
Status unaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String