CVE-2023-53822Improper Initialization in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Ignore frags from uninitialized peer in dp. When max virtual ap interfaces are configured in all the bands with ACS and hostapd restart is done every 60s, a crash is observed at random times. In this certain scenario, a fragmented packet is received for self peer, for which rx_tid and rx_frags are not initialized in datapath. While handling this fragment, crash is observed as the rx_frag list is uninitialised and

Affected Packages4 packages

Linuxlinux/linux_kernel5.6.06.1.30+1
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linuxd5c65159f2895379e11ca13f62feabe93278985de78526a06b53718bfc1dfff37864c7760e41f8ec+3
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
wifi: ath11k: Ignore frags from uninitialized peer in dp.2025-12-09
OSV
CVE-2023-53822: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Ignore frags from uninitialized peer in dp2025-12-09
GHSA
GHSA-pvmh-4xqr-52x7: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Ignore frags from uninitialized peer in dp2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath11k: Ignore frags from uninitialized peer in dp2025-12-09
Debian
CVE-2023-53822: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53822 Impact, Exploitability, and Mitigation Steps | Wiz