CVE-2023-53113

Source
https://cve.org/CVERecord?id=CVE-2023-53113
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53113.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53113
Downstream
Published
2025-05-02T15:55:52.393Z
Modified
2026-03-20T12:32:58.335179Z
Summary
wifi: nl80211: fix NULL-ptr deref in offchan check
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: fix NULL-ptr deref in offchan check

If, e.g. in AP mode, the link was already created by userspace but not activated yet, it has a chandef but the chandef isn't valid and has no channel. Check for this and ignore this link.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53113.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7b0a0e3c3a88260b6fcb017e49f198463aa62ed1
Fixed
87e80ea4fbc9ce2f2005905fdbcd38baaa47463a
Fixed
201a836c2385fdd2b9d0a8e7737bba5b26f1863a
Fixed
f624bb6fad23df3270580b4fcef415c6e7bf7705
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
7a53ad13c09150076b7ddde96c2dfc5622c90b45

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53113.json"