In the Linux kernel, the following vulnerability has been resolved:
wifi: rt2x00: Fix memory leak when handling surveys
When removing a rt2x00 device, its associated channel surveys are not freed, causing a memory leak observable with kmemleak:
unreferenced object 0xffff9620f0881a00 (size 512): comm "systemd-udevd", pid 2290, jiffies 4294906974 (age 33.768s) hex dump (first 32 bytes): 70 44 12 00 00 00 00 00 92 8a 00 00 00 00 00 00 pD.............. 00 00 00 00 00 00 00 00 ab 87 01 00 00 00 00 00 ................ backtrace: [<ffffffffb0ed858b>] _kmalloc+0x4b/0x130 [<ffffffffc1b0f29b>] rt2800probehw+0xc2b/0x1380 [rt2800lib] [<ffffffffc1a9496e>] rt2800usbprobehw+0xe/0x60 [rt2800usb] [<ffffffffc1ae491a>] rt2x00libprobedev+0x21a/0x7d0 [rt2x00lib] [<ffffffffc1b3b83e>] rt2x00usbprobe+0x1be/0x980 [rt2x00usb] [<ffffffffc05981e2>] usbprobeinterface+0xe2/0x310 [usbcore] [<ffffffffb13be2d5>] reallyprobe+0x1a5/0x410 [<ffffffffb13be5c8>] _driverprobedevice+0x78/0x180 [<ffffffffb13be6fe>] driverprobedevice+0x1e/0x90 [<ffffffffb13be972>] _driverattach+0xd2/0x1c0 [<ffffffffb13bbc57>] busforeachdev+0x77/0xd0 [<ffffffffb13bd2a2>] busadddriver+0x112/0x210 [<ffffffffb13bfc6c>] driverregister+0x5c/0x120 [<ffffffffc0596ae8>] usbregisterdriver+0x88/0x150 [usbcore] [<ffffffffb0c011c4>] dooneinitcall+0x44/0x220 [<ffffffffb0d6134c>] doinitmodule+0x4c/0x220
Fix this by freeing the channel surveys on device removal.
Tested with a RT3070 based USB wireless adapter.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54131.json",
"cna_assigner": "Linux"
}