In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix memory leak in rtw88usb Kmemleak shows the following leak arising from routine in the usb probe routine: unreferenced object 0xffff895cb29bba00 (size 512): comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s) hex dump (first 32 bytes): 77 30 30 30 00 00 00 00 02 2f 2d 2b 30 00 00 00 w000...../-+0... 02 00 2a 28 00 00 00 00 ff 55 ff ff ff 00 00 00 ..*(.....U...... backtrace: [<ffffffff9265fa36>] kmalloctrace+0x26/0x90 [<ffffffffc17eec41>] rtwusbprobe+0x2f1/0x680 [rtwusb] [<ffffffffc03e19fd>] usbprobeinterface+0xdd/0x2e0 [usbcore] [<ffffffff92b4f2fe>] reallyprobe+0x18e/0x3d0 [<ffffffff92b4f5b8>] __driverprobedevice+0x78/0x160 [<ffffffff92b4f6bf>] driverprobedevice+0x1f/0x90 [<ffffffff92b4f8df>] __driverattach+0xbf/0x1b0 [<ffffffff92b4d350>] busforeachdev+0x70/0xc0 [<ffffffff92b4e51e>] busadddriver+0x10e/0x210 [<ffffffff92b50935>] driverregister+0x55/0xf0 [<ffffffffc03e0708>] usbregisterdriver+0x88/0x140 [usbcore] [<ffffffff92401153>] dooneinitcall+0x43/0x210 [<ffffffff9254f42a>] doinit_module+0x4a/0x200 [<ffffffff92551d1c>] __dosysfinitmodule+0xac/0x120 [<ffffffff92ee6626>] dosyscall64+0x56/0x80 [<ffffffff9300006a>] entrySYSCALL64afterhwframe+0x46/0xb0 The leak was verified to be real by unloading the driver, which resulted in a dangling pointer to the allocation. The allocated memory is freed in rtwusbintfdeinit().