In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: fix NULL-ptr deref in offchan check
If, e.g. in AP mode, the link was already created by userspace but not activated yet, it has a chandef but the chandef isn't valid and has no channel. Check for this and ignore this link.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53113.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53113.json"
[
{
"id": "CVE-2023-53113-0dd34f72",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87e80ea4fbc9ce2f2005905fdbcd38baaa47463a",
"target": {
"file": "net/wireless/nl80211.c",
"function": "cfg80211_off_channel_oper_allowed"
},
"digest": {
"function_hash": "246771497975678265840868053634189411220",
"length": 401.0
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"id": "CVE-2023-53113-57f0e4fc",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f624bb6fad23df3270580b4fcef415c6e7bf7705",
"target": {
"file": "net/wireless/nl80211.c",
"function": "cfg80211_off_channel_oper_allowed"
},
"digest": {
"function_hash": "246771497975678265840868053634189411220",
"length": 401.0
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"id": "CVE-2023-53113-74168a03",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87e80ea4fbc9ce2f2005905fdbcd38baaa47463a",
"target": {
"file": "net/wireless/nl80211.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"269371167798724001451848339267656168737",
"311030223096101248844517475053751474025",
"32572926157101802340343125953715473614",
"238550131504217857806461869822385431178"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"id": "CVE-2023-53113-7cce1852",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@201a836c2385fdd2b9d0a8e7737bba5b26f1863a",
"target": {
"file": "net/wireless/nl80211.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"269371167798724001451848339267656168737",
"311030223096101248844517475053751474025",
"32572926157101802340343125953715473614",
"238550131504217857806461869822385431178"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"id": "CVE-2023-53113-86e84697",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@201a836c2385fdd2b9d0a8e7737bba5b26f1863a",
"target": {
"file": "net/wireless/nl80211.c",
"function": "cfg80211_off_channel_oper_allowed"
},
"digest": {
"function_hash": "246771497975678265840868053634189411220",
"length": 401.0
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"id": "CVE-2023-53113-a89858e4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f624bb6fad23df3270580b4fcef415c6e7bf7705",
"target": {
"file": "net/wireless/nl80211.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"269371167798724001451848339267656168737",
"311030223096101248844517475053751474025",
"32572926157101802340343125953715473614",
"238550131504217857806461869822385431178"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
}
]