In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Avoid NULL pointer access during management transmit cleanup
Currently 'ar' reference is not added in skb_cb.
Though this is generally not used during transmit completion
callbacks, on interface removal the remaining idr cleanup callback
uses the ar pointer from skb_cb from management txmgmt_idr. Hence fill them
during transmit call for proper usage to avoid NULL pointer dereference.
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
References
Configurations
History
02 Dec 2025, 02:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux linux Kernel
Linux |
|
| CWE | CWE-476 | |
| References | () https://git.kernel.org/stable/c/054b5580a36e435692c203c19abdcb9f7734320e - Patch | |
| References | () https://git.kernel.org/stable/c/7382d02160ef93c806fe1c1d4ef1fec445266747 - Patch |
Information
Published : 2025-09-15 14:15
Updated : 2025-12-02 02:57
NVD link : CVE-2023-53180
Mitre link : CVE-2023-53180
CVE.ORG link : CVE-2023-53180
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
