CVE-2023-53710NULL Pointer Dereference in Linux

Severity
4.7MEDIUM
No vector
EPSS
0.0%
top 93.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read Kernel NULL pointer dereference when ACPI SAR table isn't implemented well. Fix the error code of return to mark the ACPI SAR table as invalid. [ 5.077128] mt7921e 0000:06:00.0: sar cnt = 0 [ 5.077381] BUG: kernel NULL pointer dereference, address: 0000000000000004 [ 5.077630] #PF: supervisor read access in kernel mode [ 5.077883] #PF: error_code(0x0000) - not-p

Affected Packages4 packages

Linuxlinux/linux_kernel6.0.06.1.16+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linuxf965333e491e36adb0fa91e389fba8685b704fb62a9a5f88e0da71c8e4f30aacbda45b1a1af5469d+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
OSV
wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read2025-10-22
OSV
CVE-2023-53710: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read Kernel NULL point2025-10-22
GHSA
GHSA-c635-jccq-5wqg: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read Kernel NULL poi2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read2025-10-22
Debian
CVE-2023-53710: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mt76:...2023