CVE-2023-53529
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
02/10/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: rtw88: Fix memory leak in rtw88_usb<br />
<br />
Kmemleak shows the following leak arising from routine in the usb<br />
probe routine:<br />
<br />
unreferenced object 0xffff895cb29bba00 (size 512):<br />
comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s)<br />
hex dump (first 32 bytes):<br />
77 30 30 30 00 00 00 00 02 2f 2d 2b 30 00 00 00 w000...../-+0...<br />
02 00 2a 28 00 00 00 00 ff 55 ff ff ff 00 00 00 ..*(.....U......<br />
backtrace:<br />
[] kmalloc_trace+0x26/0x90<br />
[] rtw_usb_probe+0x2f1/0x680 [rtw_usb]<br />
[] usb_probe_interface+0xdd/0x2e0 [usbcore]<br />
[] really_probe+0x18e/0x3d0<br />
[] __driver_probe_device+0x78/0x160<br />
[] driver_probe_device+0x1f/0x90<br />
[] __driver_attach+0xbf/0x1b0<br />
[] bus_for_each_dev+0x70/0xc0<br />
[] bus_add_driver+0x10e/0x210<br />
[] driver_register+0x55/0xf0<br />
[] usb_register_driver+0x88/0x140 [usbcore]<br />
[] do_one_initcall+0x43/0x210<br />
[] do_init_module+0x4a/0x200<br />
[] __do_sys_finit_module+0xac/0x120<br />
[] do_syscall_64+0x56/0x80<br />
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
The leak was verified to be real by unloading the driver, which resulted<br />
in a dangling pointer to the allocation.<br />
<br />
The allocated memory is freed in rtw_usb_intf_deinit().



