-
CVE-2023-54053
- EPSS 0.04%
- Veröffentlicht 24.12.2025 12:23:02
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: pcie: fix possible NULL pointer dereference It is possible that iwl_pci_probe() will fail and free the trans, then afterwards iwl_pci_remove() will be called and crash by trying to access trans which is already freed, fix it. iwlwifi 0000:01:00.0: Detected crf-id 0xa5a5a5a2, cnv-id 0xa5a5a5a2 wfpm id 0xa5a5a5a2 iwlwifi 0000:01:00.0: Can't find a correct rfid for crf id 0x5a2 ... BUG: kernel NULL pointer dereference, address: 0000000000000028 ... RIP: 0010:iwl_pci_remove+0x12/0x30 [iwlwifi] pci_device_remove+0x3e/0xb0 device_release_driver_internal+0x103/0x1f0 driver_detach+0x4c/0x90 bus_remove_driver+0x5c/0xd0 driver_unregister+0x31/0x50 pci_unregister_driver+0x40/0x90 iwl_pci_unregister_driver+0x15/0x20 [iwlwifi] __exit_compat+0x9/0x98 [iwlwifi] __x64_sys_delete_module+0x147/0x260
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
f6f2d16c77f936041b8ac495fceabded4ec6c83c
Version
809805a820c6445f7a701ded24fdc6bbc841d1e4
Status
affected
Version <
0fc0d287c1e7dcb39a3b9bb0f8679cd68c2156c7
Version
809805a820c6445f7a701ded24fdc6bbc841d1e4
Status
affected
Version <
7545f21eee1356ec98581125c4dba9c4c0cc7397
Version
809805a820c6445f7a701ded24fdc6bbc841d1e4
Status
affected
Version <
0f9a1bcb94016d3a3c455a77b01f6bb06e15f6eb
Version
809805a820c6445f7a701ded24fdc6bbc841d1e4
Status
affected
Version <
dcd23aa6cc0ded7950b60ce1badb80b84045c6c0
Version
809805a820c6445f7a701ded24fdc6bbc841d1e4
Status
affected
Version <
b655b9a9f8467684cfa8906713d33b71ea8c8f54
Version
809805a820c6445f7a701ded24fdc6bbc841d1e4
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.4
Status
affected
Version <
5.4
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.244
Status
unaffected
Version <=
5.10.*
Version
5.10.181
Status
unaffected
Version <=
5.15.*
Version
5.15.113
Status
unaffected
Version <=
6.1.*
Version
6.1.30
Status
unaffected
Version <=
6.3.*
Version
6.3.4
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|