CVE-2023-54029NULL Pointer Dereference in Kernel

Severity
5.5MEDIUM
No vector
EPSS
No EPSS data
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO For MLO, we cannot use vif->bss_conf.chandef.chan->band, since that will lead to a NULL-ptr dereference as bss_conf isn't used. However, in case of real MLO, we also need to take both LMACs into account if they exist, since the station might be active on both LMACs at the same time.

Affected Packages2 packages

Linuxlinux/linux_kernel6.2.06.3.4+1
Debianlinux/linux_kernel< 6.1.37-1+2

🔴Vulnerability Details

3
OSV
CVE-2023-54029: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO For MLO, we cannot use vif->bs2025-12-24
OSV
wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO2025-12-24
GHSA
GHSA-hr4w-phgx-2f52: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO For MLO, we cannot use vif->2025-12-24

📋Vendor Advisories

1
Red Hat
kernel: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO2025-12-24

🕵️Threat Intelligence

1
Wiz
CVE-2023-54029 Impact, Exploitability, and Mitigation Steps | Wiz