GHSA-FG5H-P8W5-653V
Vulnerability from github – Published: 2025-12-30 15:30 – Updated: 2025-12-30 15:30
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup
crypto_alloc_shash() allocates resources, which should be released by crypto_free_shash(). When ath11k_peer_find() fails, there has memory leak. Add missing crypto_free_shash() to fix this.
{
"affected": [],
"aliases": [
"CVE-2023-54275"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-30T13:16:16Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup\n\ncrypto_alloc_shash() allocates resources, which should be released by\ncrypto_free_shash(). When ath11k_peer_find() fails, there has memory\nleak. Add missing crypto_free_shash() to fix this.",
"id": "GHSA-fg5h-p8w5-653v",
"modified": "2025-12-30T15:30:34Z",
"published": "2025-12-30T15:30:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-54275"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/137963e3b95776f1d57c62f249a93fe47e019a22"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/53c8a256e5d3f31d80186de03a3d2a7f747b2aa0"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/64a78ec4f4579798d8e885aca9bdd707bca6b16b"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e596b36e15a7158b0bb2d55077b6b381ee41020c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ed3f83b3459a67a3ab9d806490ac304b567b1c2d"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…