Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work() Currently the buffer pointed by event is not freed in case ATH12K_FLAG_UNREGISTERING bit is set, this causes memory leak. Add a goto skip instead of return, to ensure event and all the list entries are freed properly. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

PUBLISHED Reserved 2025-12-08 | Published 2025-12-08 | Updated 2025-12-08 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a87f59041a7f77b4bdab05cea60ac6adc69dc5d2
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 960412bee0ea75f6b3c2dca4a3535795ee84c47a
affected

Default status
affected

6.3.4 (semver)
unaffected

6.4 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/a87f59041a7f77b4bdab05cea60ac6adc69dc5d2

git.kernel.org/...c/960412bee0ea75f6b3c2dca4a3535795ee84c47a

cve.org (CVE-2023-53767)

nvd.nist.gov (CVE-2023-53767)