Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Avoid NULL pointer access during management transmit cleanup Currently 'ar' reference is not added in skb_cb. Though this is generally not used during transmit completion callbacks, on interface removal the remaining idr cleanup callback uses the ar pointer from skb_cb from management txmgmt_idr. Hence fill them during transmit call for proper usage to avoid NULL pointer dereference. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

PUBLISHED Reserved 2025-09-15 | Published 2025-09-15 | Updated 2025-09-16 | Assigner Linux

Product status

Default status
unaffected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before 7382d02160ef93c806fe1c1d4ef1fec445266747
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before 054b5580a36e435692c203c19abdcb9f7734320e
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

6.4.7 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/7382d02160ef93c806fe1c1d4ef1fec445266747

git.kernel.org/...c/054b5580a36e435692c203c19abdcb9f7734320e

cve.org (CVE-2023-53180)

nvd.nist.gov (CVE-2023-53180)

Download JSON