-
CVE-2023-53384
- EPSS 0.04%
- Published 18.09.2025 13:33:28
- Last modified 19.09.2025 16:00:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: avoid possible NULL skb pointer dereference In 'mwifiex_handle_uap_rx_forward()', always check the value returned by 'skb_copy()' to avoid potential NULL pointer dereference in 'mwifiex_uap_queue_bridged_pkt()', and drop original skb in case of copying failure. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
d155c5f64cefacdc6a9a26d40be53ee2903c28ff
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
Version <
139d285e7695279f030dbb172e2d0245425c86c6
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
Version <
231086e6a36316b823654f4535653f22d6344420
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
Version <
bef85d58f7709896ed8426560ad117a73a37762f
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
Version <
d7fd24b8d1bb54c5bcf583139e11a5e651e0263c
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
Version <
7e7197e4d6a1bc72a774590d8765909f898be1dc
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
Version <
0c57f9ad2c3ed43abb764b0247d610ff7fdb7a00
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
Version <
c2509f7c37355e1f0bd5b7087815b845fd383723
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
Version <
35a7a1ce7c7d61664ee54f5239a1f120ab95a87e
Version
838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.7
Status
affected
Version <
3.7
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.326
Status
unaffected
Version <=
4.19.*
Version
4.19.295
Status
unaffected
Version <=
5.4.*
Version
5.4.257
Status
unaffected
Version <=
5.10.*
Version
5.10.195
Status
unaffected
Version <=
5.15.*
Version
5.15.132
Status
unaffected
Version <=
6.1.*
Version
6.1.53
Status
unaffected
Version <=
6.4.*
Version
6.4.16
Status
unaffected
Version <=
6.5.*
Version
6.5.3
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.127 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|