CVE-2023-53180NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 94.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Avoid NULL pointer access during management transmit cleanup Currently 'ar' reference is not added in skb_cb. Though this is generally not used during transmit completion callbacks, on interface removal the remaining idr cleanup callback uses the ar pointer from skb_cb from management txmgmt_idr. Hence fill them during transmit call for proper usage to avoid NULL pointer dereference. Tested-on: QCN9274 hw2.0 PCI

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.36.4.7
Debianlinux/linux_kernel< 6.4.11-1+1
CVEListV5linux/linuxd889913205cf7ebda905b1e62c5867ed4e39f6c27382d02160ef93c806fe1c1d4ef1fec445266747+2
debiandebian/linux< linux 6.4.11-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7prc-j244-3g74: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Avoid NULL pointer access during management transmit cleanup Curre2025-09-15
OSV
CVE-2023-53180: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Avoid NULL pointer access during management transmit cleanup Current2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath12k: Avoid NULL pointer access during management transmit cleanup2025-09-15
Debian
CVE-2023-53180: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12...2023
CVE-2023-53180 — NULL Pointer Dereference in Linux | cvebase