-

CVE-2025-68759

In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()

In rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA
allocations in a loop. When an allocation fails, the previously
successful allocations are not freed on exit.

Fix that by jumping to err_free_rings label on error, which calls
rtl8180_free_rx_ring() to free the allocations. Remove the free of
rx_ring in rtl8180_init_rx_ring() error path, and set the freed
priv->rx_buf entry to null, to avoid double free.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 3677c01891fb0239361e444afee8398868e34bdf
Version f653211197f3841f383fa9757ef8ce182c6cf627
Status affected
Version < 89caaeee8dd95fae8bb4f4964e6fe3ca688500c4
Version f653211197f3841f383fa9757ef8ce182c6cf627
Status affected
Version < a4fb7cca9837378878e6c94d9e7af019c8fdfcdb
Version f653211197f3841f383fa9757ef8ce182c6cf627
Status affected
Version < bf8513dfa31ea015c9cf415796dca2113d293840
Version f653211197f3841f383fa9757ef8ce182c6cf627
Status affected
Version < ee7db11742b30641f21306105ad27a275e3c61d7
Version f653211197f3841f383fa9757ef8ce182c6cf627
Status affected
Version < a813a74570212cb5f3a7d3b05c0cb0cd00bace1d
Version f653211197f3841f383fa9757ef8ce182c6cf627
Status affected
Version < c9d1c4152e6d32fa74034464854bee262a60bc43
Version f653211197f3841f383fa9757ef8ce182c6cf627
Status affected
Version < 9b5b9c042b30befc5b37e4539ace95af70843473
Version f653211197f3841f383fa9757ef8ce182c6cf627
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.25
Status affected
Version < 2.6.25
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.63
Status unaffected
Version <= 6.17.*
Version 6.17.13
Status unaffected
Version <= 6.18.*
Version 6.18.2
Status unaffected
Version <= *
Version 6.19-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.