In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw88: Fix memory leak in rtw88_usb
Kmemleak shows the following leak arising from routine in the usb probe routine:
unreferenced object 0xffff895cb29bba00 (size 512): comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s) hex dump (first 32 bytes): 77 30 30 30 00 00 00 00 02 2f 2d 2b 30 00 00 00 w000...../-+0... 02 00 2a 28 00 00 00 00 ff 55 ff ff ff 00 00 00 ..*(.....U...... backtrace: [<ffffffff9265fa36>] kmalloctrace+0x26/0x90 [<ffffffffc17eec41>] rtwusbprobe+0x2f1/0x680 [rtwusb] [<ffffffffc03e19fd>] usbprobeinterface+0xdd/0x2e0 [usbcore] [<ffffffff92b4f2fe>] really_probe+0x18e/0x3d0 [<ffffffff92b4f5b8>] __driverprobedevice+0x78/0x160 [<ffffffff92b4f6bf>] driverprobedevice+0x1f/0x90 [<ffffffff92b4f8df>] __driverattach+0xbf/0x1b0 [<ffffffff92b4d350>] busfor_eachdev+0x70/0xc0 [<ffffffff92b4e51e>] busadddriver+0x10e/0x210 [<ffffffff92b50935>] driverregister+0x55/0xf0 [<ffffffffc03e0708>] usbregisterdriver+0x88/0x140 [usbcore] [<ffffffff92401153>] dooneinitcall+0x43/0x210 [<ffffffff9254f42a>] doinitmodule+0x4a/0x200 [<ffffffff92551d1c>] _dosysfinitmodule+0xac/0x120 [<ffffffff92ee6626>] dosyscall64+0x56/0x80 [<ffffffff9300006a>] entrySYSCALL64afterhwframe+0x46/0xb0
The leak was verified to be real by unloading the driver, which resulted in a dangling pointer to the allocation.
The allocated memory is freed in rtwusbintf_deinit().
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53529.json"
}