CVE-2023-53180

Source
https://cve.org/CVERecord?id=CVE-2023-53180
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53180.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53180
Downstream
Related
Published
2025-09-15T14:04:31.143Z
Modified
2026-03-20T12:11:01.994983Z
Summary
wifi: ath12k: Avoid NULL pointer access during management transmit cleanup
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Avoid NULL pointer access during management transmit cleanup

Currently 'ar' reference is not added in skbcb. Though this is generally not used during transmit completion callbacks, on interface removal the remaining idr cleanup callback uses the ar pointer from skbcb from management txmgmt_idr. Hence fill them during transmit call for proper usage to avoid NULL pointer dereference.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53180.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d889913205cf7ebda905b1e62c5867ed4e39f6c2
Fixed
7382d02160ef93c806fe1c1d4ef1fec445266747
Fixed
054b5580a36e435692c203c19abdcb9f7734320e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53180.json"