CVE-2023-53529 - wifi: rtw88: Fix memory leak in rtw88_usb
CVE ID : CVE-2023-53529
Published : Oct. 1, 2025, 12:15 p.m. | 3 hours, 26 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix memory leak in rtw88_usb Kmemleak shows the following leak arising from routine in the usb probe routine: unreferenced object 0xffff895cb29bba00 (size 512): comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s) hex dump (first 32 bytes): 77 30 30 30 00 00 00 00 02 2f 2d 2b 30 00 00 00 w000...../-+0... 02 00 2a 28 00 00 00 00 ff 55 ff ff ff 00 00 00 ..*(.....U...... backtrace: [] kmalloc_trace+0x26/0x90
[] rtw_usb_probe+0x2f1/0x680 [rtw_usb]
[] usb_probe_interface+0xdd/0x2e0 [usbcore]
[] really_probe+0x18e/0x3d0
[] __driver_probe_device+0x78/0x160
[] driver_probe_device+0x1f/0x90
[] __driver_attach+0xbf/0x1b0
[] bus_for_each_dev+0x70/0xc0
[] bus_add_driver+0x10e/0x210
[] driver_register+0x55/0xf0
[] usb_register_driver+0x88/0x140 [usbcore]
[] do_one_initcall+0x43/0x210
[] do_init_module+0x4a/0x200
[] __do_sys_finit_module+0xac/0x120
[] do_syscall_64+0x56/0x80
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0
The leak was verified to be real by unloading the driver, which resulted
in a dangling pointer to the allocation.
The allocated memory is freed in rtw_usb_intf_deinit().
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : Oct. 1, 2025, 12:15 p.m. | 3 hours, 26 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix memory leak in rtw88_usb Kmemleak shows the following leak arising from routine in the usb probe routine: unreferenced object 0xffff895cb29bba00 (size 512): comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s) hex dump (first 32 bytes): 77 30 30 30 00 00 00 00 02 2f 2d 2b 30 00 00 00 w000...../-+0... 02 00 2a 28 00 00 00 00 ff 55 ff ff ff 00 00 00 ..*(.....U...... backtrace: [
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...