CVE-2023-54300
Use-After-Free in Linux ath9k WiFi Driver Causes Memory Disclosure
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm_atheros_communications | ar9271 | * |
| linux | kernel | * |
| qualcomm | atheros | ar9271 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's ath9k wifi driver involves referencing uninitialized memory in the ath9k_wmi_ctrl_rx function. Specifically, the function does not properly validate the packet length (pkt_len) before accessing the socket buffer (SKB) data. If the SKB is malformed with a small pkt_len, the code may attempt to read a WMI command header from uninitialized memory, leading to undefined behavior.
How can this vulnerability impact me? :
The impact of this vulnerability is that the system may read uninitialized memory, which can cause crashes, data corruption, or potentially expose sensitive information. It may also lead to instability in the wifi driver or kernel, affecting system reliability.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version that includes the fix for this vulnerability, which implements sanity checking inside ath9k_wmi_ctrl_rx to avoid referencing uninitialized memory. This fix prevents uninitialized memory reads in the ath9k driver, specifically for Qualcomm Atheros AR9271 devices. Until the update is applied, consider disabling the affected wireless device or driver to mitigate potential exploitation.