{"id":"CVE-2025-68765","summary":"mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()\n\nIn mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the\nsubsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function\nreturns an error without freeing sskb, leading to a memory leak.\n\nFix this by calling dev_kfree_skb() on sskb in the error handling path\nto ensure it is properly released.","modified":"2026-03-31T17:30:03.923958Z","published":"2026-01-05T09:44:13.242Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:10039-1","openSUSE-SU-2026:10301-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68765.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1c3c234af9407256ed670c8752923a672eea4225"},{"type":"WEB","url":"https://git.kernel.org/stable/c/278bfed4529a0c9c9119f5a52ddafe69db61a75c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d42aba0ee49c0aa015c50c4f2a07cf8fa1c3a49"},{"type":"WEB","url":"https://git.kernel.org/stable/c/53d1548612670aa8b5d89745116cc33d9d172863"},{"type":"WEB","url":"https://git.kernel.org/stable/c/594ff8bb69e239678a8baa461827ce4bb90eff8f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d6c91fc732698642f70c688324c98551b97b412c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fb905e69941b44e03fe1a24e95328d45442b6d6d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68765.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68765"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"99c457d902cf90bdc0df5d57e6156ec108711068"},{"fixed":"d6c91fc732698642f70c688324c98551b97b412c"},{"fixed":"594ff8bb69e239678a8baa461827ce4bb90eff8f"},{"fixed":"1c3c234af9407256ed670c8752923a672eea4225"},{"fixed":"278bfed4529a0c9c9119f5a52ddafe69db61a75c"},{"fixed":"fb905e69941b44e03fe1a24e95328d45442b6d6d"},{"fixed":"4d42aba0ee49c0aa015c50c4f2a07cf8fa1c3a49"},{"fixed":"53d1548612670aa8b5d89745116cc33d9d172863"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68765.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.7.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.0"},{"fixed":"6.18.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68765.json"}}],"schema_version":"1.7.5"}