-

CVE-2023-53321

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211_hwsim: drop short frames

While technically some control frames like ACK are shorter and
end after Address 1, such frames shouldn't be forwarded through
wmediumd or similar userspace, so require the full 3-address
header to avoid accessing invalid memory if shorter frames are
passed in.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 3beb97bed860d95b14ad23578ce8ddaea62023db
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 672205c6f2d11978fcd7f0f336bb2c708e28874b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c64ee9dd335832d5e2ab0a8fc83a34ad4c729799
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b9a175e3b250b0dc6e152988040aa5014e98e61e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 89a41ed7f21476301659ebd25ccb48a60791c1a7
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < fba360a047d5eeeb9d4b7c3a9b1c8308980ce9a6
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.197
Status unaffected
Version <= 5.15.*
Version 5.15.133
Status unaffected
Version <= 6.1.*
Version 6.1.55
Status unaffected
Version <= 6.5.*
Version 6.5.5
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string