CVE-2023-53153Use After Free in Linux

CWE-416Use After Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Fix use after free for wext Key information in wext.connect is not reset on (re)connect and can hold data from a previous connection. Reset key data to avoid that drivers or mac80211 incorrectly detect a WEP connection request and access the freed or already reused memory. Additionally optimize cfg80211_sme_connect() and avoid an useless schedule of conn_work.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel2.6.324.14.308+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxfffd0934b9390f34bec45762192b7edd3b12b4b566af4a2ab1d65d556d638cb9555a3b823c2557a9+8
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mmx3-2qhv-f4x6: In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Fix use after free for wext Key information in wext2025-09-15
OSV
CVE-2023-53153: In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Fix use after free for wext Key information in wext2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: wifi: cfg80211: Fix use after free for wext2025-09-15
Debian
CVE-2023-53153: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80...2023
CVE-2023-53153 — Use After Free in Linux | cvebase