CVE-2023-53588Improper Check for Unusual or Exceptional Conditions in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for station first in client probe When probing a client, first check if we have it, and then check for the channel context, otherwise you can trigger the warning there easily by probing when the AP isn't even started yet. Since a client existing means the AP is also operating, we can then keep the warning. Also simplify the moved code a bit.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel3.86.1.55+1
Debianlinux/linux_kernel< 6.1.55-1+2
CVEListV5linux/linux55de908ab292c03f1eb280f51170ddb9c6b57e317e1cda5cf07f848e6b50b4e5e7761ffbce905a3d+3
debiandebian/linux< linux 6.1.55-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-qq6w-hrfm-74vg: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for station first in client probe When probing a client, f2025-10-04
OSV
CVE-2023-53588: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for station first in client probe When probing a client, fir2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: wifi: mac80211: check for station first in client probe2025-10-04
Debian
CVE-2023-53588: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...2023