
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's WiFi subsystem, specifically in the ath12k driver's rfkill configuration error handling, was identified and assigned CVE-2023-52688. The issue was discovered during a code review and involves improper resource management when the core rfkill configuration encounters an error (Kernel Git).
The vulnerability stems from a failure to properly free allocated resources when the core rfkill configuration encounters an error in the ath12k driver. Specifically, the code was not freeing the core pdev create resources in the error handler of core rfkill config. This issue was introduced in commit 004ccbc0dd49 which added support for hardware rfkill for WCN7850 (Kernel Git).
The vulnerability could potentially lead to resource leaks in the Linux kernel when errors occur during rfkill configuration in systems using the ath12k wireless driver (NVD).
The issue has been resolved by modifying the error handler to properly call the core pdev destroy function when encountering rfkill configuration errors. The fix was implemented through a patch that adds appropriate resource cleanup in the error handling path (Kernel Git).
Red Hat Enterprise Linux has been reported as not vulnerable to this CVE, as it does not affect the versions or configurations of the Linux kernel used in their distribution (Red Hat Portal).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."