CVE-2023-53321
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-10
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 5.4.257 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.197 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.133 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.55 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.5.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's wifi mac80211_hwsim component improperly handling short frames. Some control frames like ACK are shorter and end after Address 1, but these frames should not be forwarded through wmediumd or similar userspace programs. The vulnerability arises because the code expects a full 3-address header, and if shorter frames are passed in, it can lead to accessing invalid memory.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to access invalid memory when processing certain short wifi control frames, potentially leading to system instability or crashes in the wifi simulation environment. This could affect the reliability of wireless networking components that use mac80211_hwsim and wmediumd.