CVE-2023-54029

Source
https://cve.org/CVERecord?id=CVE-2023-54029
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54029.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54029
Downstream
Published
2025-12-24T10:55:57.443Z
Modified
2026-03-12T03:29:55.486896Z
Summary
wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: fix iwlmvmmaxamsdusize() for MLO

For MLO, we cannot use vif->bssconf.chandef.chan->band, since that will lead to a NULL-ptr dereference as bssconf isn't used. However, in case of real MLO, we also need to take both LMACs into account if they exist, since the station might be active on both LMACs at the same time.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54029.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
63e2d06adf6b0842132ba89efdf8fada5f7ff1ac
Fixed
4489aa868bc6343afdaf5ef324af5b1f64962b25
Fixed
b2bc600cced23762d4e97db8989b18772145604f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54029.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.30
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.3.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54029.json"