CVE-2023-53822 — Improper Initialization in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Ignore frags from uninitialized peer in dp.
When max virtual ap interfaces are configured in all the bands with
ACS and hostapd restart is done every 60s, a crash is observed at
random times.
In this certain scenario, a fragmented packet is received for
self peer, for which rx_tid and rx_frags are not initialized in
datapath. While handling this fragment, crash is observed as the
rx_frag list is uninitialised and…
Affected Packages4 packages
▶CVEListV5linux/linuxd5c65159f2895379e11ca13f62feabe93278985d — e78526a06b53718bfc1dfff37864c7760e41f8ec+3
🔴Vulnerability Details
3OSV▶
CVE-2023-53822: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Ignore frags from uninitialized peer in dp↗2025-12-09
GHSA▶
GHSA-pvmh-4xqr-52x7: In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Ignore frags from uninitialized peer in dp↗2025-12-09