{"id":"CVE-2023-53802","summary":"wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function\n\nIt is stated that ath9k_htc_rx_msg() either frees the provided skb or\npasses its management to another callback function. However, the skb is\nnot freed in case there is no another callback function, and Syzkaller was\nable to cause a memory leak. Also minor comment fix.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.","modified":"2026-04-02T09:45:16.072584Z","published":"2025-12-09T00:00:58.582Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:1078-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53802.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/564bc2222bf50eb6cdee715a5431bf4dc9f923c1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5a84e51f72580fc70066b03f3dac38421e702a0b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/68171c006c8645a3e0293a6c3e6037c6538ac1c5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9b25e3985477ac3f02eca5fc1e0cc6850a3f7e69"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b11f95f65cc52ee3a756e6f6a88df37a203e25bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bbfababb4f899fe1556eac195f9774b6fe675fb6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c0c0614f143b568cd0e9525d53cf12e5dcd11987"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec246dfe006b2a8f36353f7489e4f525114db9a5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53802.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53802"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"fb9987d0f748c983bb795a86f47522313f701a08"},{"fixed":"b11f95f65cc52ee3a756e6f6a88df37a203e25bd"},{"fixed":"68171c006c8645a3e0293a6c3e6037c6538ac1c5"},{"fixed":"564bc2222bf50eb6cdee715a5431bf4dc9f923c1"},{"fixed":"ec246dfe006b2a8f36353f7489e4f525114db9a5"},{"fixed":"c0c0614f143b568cd0e9525d53cf12e5dcd11987"},{"fixed":"5a84e51f72580fc70066b03f3dac38421e702a0b"},{"fixed":"bbfababb4f899fe1556eac195f9774b6fe675fb6"},{"fixed":"9b25e3985477ac3f02eca5fc1e0cc6850a3f7e69"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53802.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.35"},{"fixed":"4.14.308"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.276"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.173"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.99"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53802.json"}}],"schema_version":"1.7.5"}