CVE-2023-54016
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix memory leak in rx_desc and tx_desc
Currently when ath12k_dp_cc_desc_init() is called we allocate memory to rx_descs and tx_descs. In ath12k_dp_cc_cleanup(), during descriptor cleanup rx_descs and tx_descs memory is not freed.
This is cause of memory leak. These allocated memory should be freed in ath12k_dp_cc_cleanup.
In ath12k_dp_cc_desc_init(), we can save base address of rx_descs and tx_descs. In ath12k_dp_cc_cleanup(), we can free rx_descs and tx_descs memory using their base address.
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in ath12k driver's rx_desc and tx_desc allocation during cleanup.
Vulnerability
In the Linux kernel's ath12k WiFi driver, a memory leak exists in the ath12k_dp_cc_desc_init() and ath12k_dp_cc_cleanup() functions. When ath12k_dp_cc_desc_init() is called, memory is allocated for rx_descs and tx_descs. However, in ath12k_dp_cc_cleanup(), this allocated memory is not freed, leading to a memory leak over time [1].
Exploitation
The vulnerability can be triggered by repeatedly initializing and cleaning up the descriptor cache, which may occur during normal driver operation, such as module load/unload cycles or device resets. No special privileges or network access are required; any local user or process that can trigger these driver operations can exploit the leak.
Impact
An attacker can exhaust system memory by repeatedly triggering the leak, leading to denial of service (DoS) conditions. Over time, the system may become unresponsive or crash due to memory exhaustion.
Mitigation
The fix is available in the Linux kernel stable tree. Users should update to a kernel version containing commit afb522b36e76acaa9f8fc06d0a9742d841c47c16 [1]. No workaround is documented.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
2e16be2d34883afb522b36e76Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
2News mentions
0No linked articles in our index yet.