VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54016

CVE-2023-54016

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix memory leak in rx_desc and tx_desc

Currently when ath12k_dp_cc_desc_init() is called we allocate memory to rx_descs and tx_descs. In ath12k_dp_cc_cleanup(), during descriptor cleanup rx_descs and tx_descs memory is not freed.

This is cause of memory leak. These allocated memory should be freed in ath12k_dp_cc_cleanup.

In ath12k_dp_cc_desc_init(), we can save base address of rx_descs and tx_descs. In ath12k_dp_cc_cleanup(), we can free rx_descs and tx_descs memory using their base address.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Memory leak in ath12k driver's rx_desc and tx_desc allocation during cleanup.

Vulnerability

In the Linux kernel's ath12k WiFi driver, a memory leak exists in the ath12k_dp_cc_desc_init() and ath12k_dp_cc_cleanup() functions. When ath12k_dp_cc_desc_init() is called, memory is allocated for rx_descs and tx_descs. However, in ath12k_dp_cc_cleanup(), this allocated memory is not freed, leading to a memory leak over time [1].

Exploitation

The vulnerability can be triggered by repeatedly initializing and cleaning up the descriptor cache, which may occur during normal driver operation, such as module load/unload cycles or device resets. No special privileges or network access are required; any local user or process that can trigger these driver operations can exploit the leak.

Impact

An attacker can exhaust system memory by repeatedly triggering the leak, leading to denial of service (DoS) conditions. Over time, the system may become unresponsive or crash due to memory exhaustion.

Mitigation

The fix is available in the Linux kernel stable tree. Users should update to a kernel version containing commit afb522b36e76acaa9f8fc06d0a9742d841c47c16 [1]. No workaround is documented.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.