CVE-2023-54029
Unknown Unknown - Not Provided
Null Pointer Dereference in Linux iwlwifi MLO Handling

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO For MLO, we cannot use vif->bss_conf.chandef.chan->band, since that will lead to a NULL-ptr dereference as bss_conf isn't used. However, in case of real MLO, we also need to take both LMACs into account if they exist, since the station might be active on both LMACs at the same time.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-01-04
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's iwlwifi driver related to MLO (Multi-Link Operation). The issue arises because the code incorrectly uses vif->bss_conf.chandef.chan->band, which can lead to a NULL pointer dereference since bss_conf is not used in MLO. Additionally, for real MLO, both LMACs need to be considered because a station might be active on both simultaneously. The fix addresses these issues to prevent the NULL pointer dereference and properly handle multiple LMACs.


How can this vulnerability impact me? :

This vulnerability can cause a NULL pointer dereference in the Linux kernel's wifi driver, which may lead to system crashes or instability when using MLO features. This could disrupt network connectivity or cause denial of service on affected systems.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart