CVE-2023-54131
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
24/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: rt2x00: Fix memory leak when handling surveys<br />
<br />
When removing a rt2x00 device, its associated channel surveys<br />
are not freed, causing a memory leak observable with kmemleak:<br />
<br />
unreferenced object 0xffff9620f0881a00 (size 512):<br />
comm "systemd-udevd", pid 2290, jiffies 4294906974 (age 33.768s)<br />
hex dump (first 32 bytes):<br />
70 44 12 00 00 00 00 00 92 8a 00 00 00 00 00 00 pD..............<br />
00 00 00 00 00 00 00 00 ab 87 01 00 00 00 00 00 ................<br />
backtrace:<br />
[] __kmalloc+0x4b/0x130<br />
[] rt2800_probe_hw+0xc2b/0x1380 [rt2800lib]<br />
[] rt2800usb_probe_hw+0xe/0x60 [rt2800usb]<br />
[] rt2x00lib_probe_dev+0x21a/0x7d0 [rt2x00lib]<br />
[] rt2x00usb_probe+0x1be/0x980 [rt2x00usb]<br />
[] usb_probe_interface+0xe2/0x310 [usbcore]<br />
[] really_probe+0x1a5/0x410<br />
[] __driver_probe_device+0x78/0x180<br />
[] driver_probe_device+0x1e/0x90<br />
[] __driver_attach+0xd2/0x1c0<br />
[] bus_for_each_dev+0x77/0xd0<br />
[] bus_add_driver+0x112/0x210<br />
[] driver_register+0x5c/0x120<br />
[] usb_register_driver+0x88/0x150 [usbcore]<br />
[] do_one_initcall+0x44/0x220<br />
[] do_init_module+0x4c/0x220<br />
<br />
Fix this by freeing the channel surveys on device removal.<br />
<br />
Tested with a RT3070 based USB wireless adapter.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0354bce76ed1d775904acdb4cc0bf88c5b9b5b9f
- https://git.kernel.org/stable/c/494064ffd60d044c097d514917c40913d1affbca
- https://git.kernel.org/stable/c/bea3f8aa999318bdffa2d17753e492f76904f0ce
- https://git.kernel.org/stable/c/cbef9a83c51dfcb07f77cfa6ac26f53a1ea86f49
- https://git.kernel.org/stable/c/eb77c0c0a17c53d83b5fe8e46490fb0a7ed9e6af



