Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix NULL-ptr deref in offchan check If, e.g. in AP mode, the link was already created by userspace but not activated yet, it has a chandef but the chandef isn't valid and has no channel. Check for this and ignore this link.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.19.2, < 6.1.21 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/201a836c2385fdd2b9d0a8e7737bba5b26f1863aPatch
- https://git.kernel.org/stable/c/87e80ea4fbc9ce2f2005905fdbcd38baaa47463aPatch
- https://git.kernel.org/stable/c/f624bb6fad23df3270580b4fcef415c6e7bf7705Patch
FAQ
What is CVE-2023-53113?
CVE-2023-53113 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix NULL-ptr deref in offchan check If, e.g. in AP mode, the link was already created by userspace but not activate...
How severe is CVE-2023-53113?
CVE-2023-53113 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53113?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.