-

CVE-2023-53641

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: hif_usb: fix memory leak of remain_skbs

hif_dev->remain_skb is allocated and used exclusively in
ath9k_hif_usb_rx_stream(). It is implied that an allocated remain_skb is
processed and subsequently freed (in error paths) only during the next
call of ath9k_hif_usb_rx_stream().

So, if the urbs are deallocated between those two calls due to the device
deinitialization or suspend, it is possible that ath9k_hif_usb_rx_stream()
is not called next time and the allocated remain_skb is leaked. Our local
Syzkaller instance was able to trigger that.

remain_skb makes sense when receiving two consecutive urbs which are
logically linked together, i.e. a specific data field from the first skb
indicates a cached skb to be allocated, memcpy'd with some data and
subsequently processed in the next call to ath9k_hif_usb_rx_stream(). Urbs
deallocation supposedly makes that link irrelevant so we need to free the
cached skb in those cases.

Fix the leak by introducing a function to explicitly free remain_skb (if
it is not NULL) when the rx urbs have been deallocated. remain_skb is NULL
when it has not been allocated at all (hif_dev struct is kzalloced) or
when it has been processed in next call to ath9k_hif_usb_rx_stream().

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 6719e3797ec52cd144c8a5ba8aaab36674800585
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < d9899318660791141ea6002fda5577b2c5d7386e
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 320d760a35273aa815d58b57e4fd9ba5279a3489
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 59073060fe0950c6ecbe12bdc06469dcac62128d
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 9b9356a3014123f0ce4b50d9278c1265173150ab
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < f0931fc8f4b6847c72e170d2326861c0a081d680
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 8f02d538878c9b1501f624595eb22ee4e5e0ff84
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 7654cc03eb699297130b693ec34e25f77b17c947
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.35
Status affected
Version < 2.6.35
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.283
Status unaffected
Version <= 5.4.*
Version 5.4.243
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.111
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String