CVE-2025-71273
Awaiting Analysis Awaiting Analysis - Queue
Memory Leak in Linux Kernel WiFi Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() Simplify the code by using device managed memory allocations. This also fixes a memory leak in rtw_register_hw(). The supported bands were not freed in the error path. Copied from commit 145df52a8671 ("wifi: rtw89: Convert rtw89_core_set_supported_band to use devm_*").
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux_kernel linux_kernel *
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is related to the Linux kernel's wifi driver, specifically the rtw88 module. It involves improper memory management where supported bands were not freed properly in the error path of the rtw_register_hw() function, causing a memory leak.

The fix involved simplifying the code by using device managed memory allocations through the devm_kmemdup() function in rtw_set_supported_band(), which ensures that memory is automatically freed when no longer needed.


How can this vulnerability impact me? :

This vulnerability can lead to a memory leak in the Linux kernel's wifi driver. Over time, this could cause increased memory usage, potentially degrading system performance or causing instability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart