CVE-2023-52783

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52783
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52783.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52783
Downstream
Related
Published
2024-05-21T15:31:01Z
Modified
2025-10-08T16:39:31.771456Z
Summary
net: wangxun: fix kernel panic due to null pointer
Details

In the Linux kernel, the following vulnerability has been resolved:

net: wangxun: fix kernel panic due to null pointer

When the device uses a custom subsystem vendor ID, the function wxswinit() returns before the memory of 'wx->mac_table' is allocated. The null pointer will causes the kernel panic.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
79625f45ca73ef37c18a6e4b5b6ce7daa1e92683
Fixed
61a55071653974dab172d4c5d699bb365cfd13c9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
79625f45ca73ef37c18a6e4b5b6ce7daa1e92683
Fixed
8ba2c459668cfe2aaacc5ebcd35b4b9ef8643013

Affected versions

v6.*

v6.2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.2
v6.6.3
v6.7-rc1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.6.4