In the Linux kernel, the following vulnerability has been resolved:
wifi: mwifiex: avoid possible NULL skb pointer dereference
In 'mwifiex_handle_uap_rx_forward()', always check the value
returned by 'skb_copy()' to avoid potential NULL pointer
dereference in 'mwifiex_uap_queue_bridged_pkt()', and drop
original skb in case of copying failure.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
History
11 Dec 2025, 18:21
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-476 | |
| References | () https://git.kernel.org/stable/c/0c57f9ad2c3ed43abb764b0247d610ff7fdb7a00 - Patch | |
| References | () https://git.kernel.org/stable/c/139d285e7695279f030dbb172e2d0245425c86c6 - Patch | |
| References | () https://git.kernel.org/stable/c/231086e6a36316b823654f4535653f22d6344420 - Patch | |
| References | () https://git.kernel.org/stable/c/35a7a1ce7c7d61664ee54f5239a1f120ab95a87e - Patch | |
| References | () https://git.kernel.org/stable/c/7e7197e4d6a1bc72a774590d8765909f898be1dc - Patch | |
| References | () https://git.kernel.org/stable/c/bef85d58f7709896ed8426560ad117a73a37762f - Patch | |
| References | () https://git.kernel.org/stable/c/c2509f7c37355e1f0bd5b7087815b845fd383723 - Patch | |
| References | () https://git.kernel.org/stable/c/d155c5f64cefacdc6a9a26d40be53ee2903c28ff - Patch | |
| References | () https://git.kernel.org/stable/c/d7fd24b8d1bb54c5bcf583139e11a5e651e0263c - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux
Linux linux Kernel |
18 Sep 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-18 14:15
Updated : 2025-12-11 18:21
NVD link : CVE-2023-53384
Mitre link : CVE-2023-53384
CVE.ORG link : CVE-2023-53384
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
