-
CVE-2023-53641
- EPSS -
- Veröffentlicht 07.10.2025 15:19:41
- Zuletzt bearbeitet 07.10.2025 16:15:47
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: fix memory leak of remain_skbs hif_dev->remain_skb is allocated and used exclusively in ath9k_hif_usb_rx_stream(). It is implied that an allocated remain_skb is processed and subsequently freed (in error paths) only during the next call of ath9k_hif_usb_rx_stream(). So, if the urbs are deallocated between those two calls due to the device deinitialization or suspend, it is possible that ath9k_hif_usb_rx_stream() is not called next time and the allocated remain_skb is leaked. Our local Syzkaller instance was able to trigger that. remain_skb makes sense when receiving two consecutive urbs which are logically linked together, i.e. a specific data field from the first skb indicates a cached skb to be allocated, memcpy'd with some data and subsequently processed in the next call to ath9k_hif_usb_rx_stream(). Urbs deallocation supposedly makes that link irrelevant so we need to free the cached skb in those cases. Fix the leak by introducing a function to explicitly free remain_skb (if it is not NULL) when the rx urbs have been deallocated. remain_skb is NULL when it has not been allocated at all (hif_dev struct is kzalloced) or when it has been processed in next call to ath9k_hif_usb_rx_stream(). Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
6719e3797ec52cd144c8a5ba8aaab36674800585
Version
fb9987d0f748c983bb795a86f47522313f701a08
Status
affected
Version <
d9899318660791141ea6002fda5577b2c5d7386e
Version
fb9987d0f748c983bb795a86f47522313f701a08
Status
affected
Version <
320d760a35273aa815d58b57e4fd9ba5279a3489
Version
fb9987d0f748c983bb795a86f47522313f701a08
Status
affected
Version <
59073060fe0950c6ecbe12bdc06469dcac62128d
Version
fb9987d0f748c983bb795a86f47522313f701a08
Status
affected
Version <
9b9356a3014123f0ce4b50d9278c1265173150ab
Version
fb9987d0f748c983bb795a86f47522313f701a08
Status
affected
Version <
f0931fc8f4b6847c72e170d2326861c0a081d680
Version
fb9987d0f748c983bb795a86f47522313f701a08
Status
affected
Version <
8f02d538878c9b1501f624595eb22ee4e5e0ff84
Version
fb9987d0f748c983bb795a86f47522313f701a08
Status
affected
Version <
7654cc03eb699297130b693ec34e25f77b17c947
Version
fb9987d0f748c983bb795a86f47522313f701a08
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.35
Status
affected
Version <
2.6.35
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.283
Status
unaffected
Version <=
5.4.*
Version
5.4.243
Status
unaffected
Version <=
5.10.*
Version
5.10.180
Status
unaffected
Version <=
5.15.*
Version
5.15.111
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|