DEBIAN-CVE-2023-54016

Source
https://security-tracker.debian.org/tracker/CVE-2023-54016
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54016.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-54016
Upstream
Published
2025-12-24T11:15:54.570Z
Modified
2026-01-05T17:17:00.411251Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix memory leak in rxdesc and txdesc Currently when ath12kdpccdescinit() is called we allocate memory to rxdescs and txdescs. In ath12kdpcccleanup(), during descriptor cleanup rxdescs and txdescs memory is not freed. This is cause of memory leak. These allocated memory should be freed in ath12kdpcccleanup. In ath12kdpccdescinit(), we can save base address of rxdescs and txdescs. In ath12kdpcccleanup(), we can free rxdescs and txdescs memory using their base address. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPLSILICONZ-1

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54016.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54016.json"