Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band()

Simplify the code by using device managed memory allocations.

This also fixes a memory leak in rtw_register_hw(). The supported bands
were not freed in the error path.

Copied from commit 145df52a8671 ("wifi: rtw89: Convert
rtw89_core_set_supported_band to use devm_*").
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel’s rtw88 Wi‑Fi driver, a memory allocation performed in rtw_register_hw() was not released when the driver encountered an error. The allocation used a manual kmemdup that required explicit free; the error path omitted this cleanup, creating a memory leak. The fix replaces the allocation with a device‑managed devm_kmemdup, which automatically frees the memory when the driver unloads or on error. This weakness matches CWE‑368 and can cause kernel memory exhaustion over time, potentially leading to a panic or forced reboot. The flaw does not enable arbitrary code execution or data disclosure.

Affected Systems

The vulnerability affects all Linux kernel versions that ship the rtw88 driver without the commit that changes rtw_set_supported_band() to use devm_kmemdup. This assessment is inferred from the commit references, as specific affected versions are not listed in the CVE data. The rtw89 driver contains a similar issue, so kernels with that module without the commit are also affected. Distribution‑specific kernel packages should verify whether the change is already present before deciding on remediation. The known CNA vendors list includes Linux: Linux, confirming the entire kernel is impacted.

Risk and Exploitability

The EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, indicating no known public exploitation. However, the memory leak can be exercised by any process that is able to trigger an error condition in the driver – for example, by loading, unloading, or reinitializing the Wi‑Fi module. Based on the description, it is inferred that the attack requires local access to the system, at most requiring elevated privilege to load the driver. Repeated exploitation can eventually exhaust kernel memory, causing a denial of service. Because no arbitrary code execution is possible, the risk is limited to local privilege or root, but the potential outage can be severe.

Generated by OpenCVE AI on May 6, 2026 at 16:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that includes commit 145df52a8671, ensuring rtw_set_supported_band() uses devm_kmemdup.
  • If an immediate kernel upgrade is not possible, unload or blacklist the rtw88 (and rtw89) Wi‑Fi driver module to prevent the vulnerable code from executing.
  • Monitor kernel logs for repeated driver errors and look for signs of memory usage growth; if kernel memory exhaustion is observed, reboot the system and plan to apply the patch as soon as possible.

Generated by OpenCVE AI on May 6, 2026 at 16:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-368

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() Simplify the code by using device managed memory allocations. This also fixes a memory leak in rtw_register_hw(). The supported bands were not freed in the error path. Copied from commit 145df52a8671 ("wifi: rtw89: Convert rtw89_core_set_supported_band to use devm_*").
Title wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:06.825Z

Reserved: 2026-03-17T09:08:18.458Z

Link: CVE-2025-71273

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:27.330

Modified: 2026-05-06T13:07:51.607

Link: CVE-2025-71273

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T16:45:07Z

Weaknesses