CVE-2023-53180
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.3 (inc) to 6.4.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's wifi ath12k driver involves a NULL pointer dereference during management transmit cleanup. Specifically, the 'ar' reference is not added in skb_cb, which is generally not used during transmit completion callbacks. However, on interface removal, the remaining idr cleanup callback uses the 'ar' pointer from skb_cb from management txmgmt_idr. Because 'ar' is not properly set during transmit, this can lead to a NULL pointer dereference. The fix involves filling the 'ar' pointer during transmit calls to avoid this issue.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel's wifi driver, which may lead to kernel crashes or system instability during wifi interface removal or management transmit cleanup. This can impact system reliability and availability.