-

CVE-2023-53384

In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: avoid possible NULL skb pointer dereference

In 'mwifiex_handle_uap_rx_forward()', always check the value
returned by 'skb_copy()' to avoid potential NULL pointer
dereference in 'mwifiex_uap_queue_bridged_pkt()', and drop
original skb in case of copying failure.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < d155c5f64cefacdc6a9a26d40be53ee2903c28ff
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
Version < 139d285e7695279f030dbb172e2d0245425c86c6
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
Version < 231086e6a36316b823654f4535653f22d6344420
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
Version < bef85d58f7709896ed8426560ad117a73a37762f
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
Version < d7fd24b8d1bb54c5bcf583139e11a5e651e0263c
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
Version < 7e7197e4d6a1bc72a774590d8765909f898be1dc
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
Version < 0c57f9ad2c3ed43abb764b0247d610ff7fdb7a00
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
Version < c2509f7c37355e1f0bd5b7087815b845fd383723
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
Version < 35a7a1ce7c7d61664ee54f5239a1f120ab95a87e
Version 838e4f44929782a2163c7bc95a7cd2da5d8b47f9
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.7
Status affected
Version < 3.7
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.53
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.127
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String