๐Ÿ” CVE Alert

CVE-2023-53180

UNKNOWN 0.0

wifi: ath12k: Avoid NULL pointer access during management transmit cleanup

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Avoid NULL pointer access during management transmit cleanup Currently 'ar' reference is not added in skb_cb. Though this is generally not used during transmit completion callbacks, on interface removal the remaining idr cleanup callback uses the ar pointer from skb_cb from management txmgmt_idr. Hence fill them during transmit call for proper usage to avoid NULL pointer dereference. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d889913205cf7ebda905b1e62c5867ed4e39f6c2 < 7382d02160ef93c806fe1c1d4ef1fec445266747 d889913205cf7ebda905b1e62c5867ed4e39f6c2 < 054b5580a36e435692c203c19abdcb9f7734320e
Linux / Linux
6.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7382d02160ef93c806fe1c1d4ef1fec445266747 git.kernel.org: https://git.kernel.org/stable/c/054b5580a36e435692c203c19abdcb9f7734320e