Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-53529

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
02/10/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: rtw88: Fix memory leak in rtw88_usb<br /> <br /> Kmemleak shows the following leak arising from routine in the usb<br /> probe routine:<br /> <br /> unreferenced object 0xffff895cb29bba00 (size 512):<br /> comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s)<br /> hex dump (first 32 bytes):<br /> 77 30 30 30 00 00 00 00 02 2f 2d 2b 30 00 00 00 w000...../-+0...<br /> 02 00 2a 28 00 00 00 00 ff 55 ff ff ff 00 00 00 ..*(.....U......<br /> backtrace:<br /> [] kmalloc_trace+0x26/0x90<br /> [] rtw_usb_probe+0x2f1/0x680 [rtw_usb]<br /> [] usb_probe_interface+0xdd/0x2e0 [usbcore]<br /> [] really_probe+0x18e/0x3d0<br /> [] __driver_probe_device+0x78/0x160<br /> [] driver_probe_device+0x1f/0x90<br /> [] __driver_attach+0xbf/0x1b0<br /> [] bus_for_each_dev+0x70/0xc0<br /> [] bus_add_driver+0x10e/0x210<br /> [] driver_register+0x55/0xf0<br /> [] usb_register_driver+0x88/0x140 [usbcore]<br /> [] do_one_initcall+0x43/0x210<br /> [] do_init_module+0x4a/0x200<br /> [] __do_sys_finit_module+0xac/0x120<br /> [] do_syscall_64+0x56/0x80<br /> [] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> <br /> The leak was verified to be real by unloading the driver, which resulted<br /> in a dangling pointer to the allocation.<br /> <br /> The allocated memory is freed in rtw_usb_intf_deinit().

Impacto