CVE-2023-53532
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | ipq8074 | * |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the Linux kernel's ath11k WiFi driver related to improper handling of firmware resource deinitialization. Specifically, for certain chipsets without fixed firmware memory and TrustZone support, the driver attempts to unmap memory that was never mapped during initialization. This leads to a kernel NULL pointer dereference and a system crash (kernel panic) during device shutdown or reboot.
How can this vulnerability impact me? :
The vulnerability can cause the system to crash or become unstable during reboot or when the affected WiFi driver module is removed. This can lead to denial of service as the kernel encounters a NULL pointer dereference and fails to properly handle the firmware resource deinitialization.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for specific NULL pointer dereference traces related to the ath11k_ahb driver during reboot or module removal. You can check the kernel log for messages similar to: sudo dmesg | grep -i 'ath11k_ahb' Look for lines indicating 'Unable to handle kernel NULL pointer dereference' and call traces involving __iommu_unmap and ath11k_ahb_fw_resource_deinit. This indicates the vulnerability is being triggered on your system.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by adding a condition check on firmware fixed memory in the ath11k_ahb driver. Until an update is applied, avoid rebooting or removing the ath11k_ahb module on affected chipsets that do not have fixed firmware memory to prevent kernel crashes.