Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-53113— wifi: nl80211: fix NULL-ptr deref in offchan check

EPSS 0.05% · P15
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-53113

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
wifi: nl80211: fix NULL-ptr deref in offchan check
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix NULL-ptr deref in offchan check If, e.g. in AP mode, the link was already created by userspace but not activated yet, it has a chandef but the chandef isn't valid and has no channel. Check for this and ignore this link.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于nl80211在检查offchan时存在空指针解引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 ~ 87e80ea4fbc9ce2f2005905fdbcd38baaa47463a -
LinuxLinux 6.0 -

II. Public POCs for CVE-2023-53113

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-53113

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-05-02 · 107 CVEs total

CVE-2023-53100ext4: fix WARNING in ext4_update_inline_data
CVE-2023-53115scsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()
CVE-2023-53114i40e: Fix kernel crash during reboot when adapter is in recovery mode
CVE-2023-53112drm/i915/sseu: fix max_subslices array-index-out-of-bounds access
CVE-2023-53111loop: Fix use-after-free issues
CVE-2023-53109net: tunnels: annotate lockless accesses to dev->needed_headroom
CVE-2023-53110net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()
CVE-2023-53108net/iucv: Fix size of interrupt data
CVE-2023-53106nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition
CVE-2023-53107veth: Fix use after free in XDP_REDIRECT
CVE-2023-53105net/mlx5e: Fix cleanup null-ptr deref on encap lock
CVE-2023-53103bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
CVE-2023-53101ext4: zero i_disksize when initializing the bootloader inode
CVE-2023-53102ice: xsk: disable txq irq before flushing hw
CVE-2023-53090drm/amdkfd: Fix an illegal memory access
CVE-2023-53092interconnect: exynos: fix node leak in probe PM QoS error path
CVE-2023-53093tracing: Do not let histogram values have some modifiers
CVE-2023-53091ext4: update s_journal_inum if it changes after journal replay
CVE-2023-53094tty: serial: fsl_lpuart: fix race on RX DMA shutdown
CVE-2023-53089ext4: fix task hung in ext4_xattr_delete_inode

Showing top 20 of 107 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-53113

No comments yet


Leave a comment