In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: fix NULL-ptr deref in offchan check
If, e.g. in AP mode, the link was already created by userspace
but not activated yet, it has a chandef but the chandef isn't
valid and has no channel. Check for this and ignore this link.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Jun 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
Weaknesses | CWE-476 | |
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
Mon, 05 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 02 May 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix NULL-ptr deref in offchan check If, e.g. in AP mode, the link was already created by userspace but not activated yet, it has a chandef but the chandef isn't valid and has no channel. Check for this and ignore this link. | |
Title | wifi: nl80211: fix NULL-ptr deref in offchan check | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-02T15:55:52.393Z
Updated: 2025-05-04T12:50:26.011Z
Reserved: 2025-05-02T15:51:43.554Z
Link: CVE-2023-53113

No data.

Status : Awaiting Analysis
Published: 2025-05-02T16:15:30.407
Modified: 2025-05-05T20:54:19.760
Link: CVE-2023-53113
