In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: fix NULL-ptr deref in offchan check
If, e.g. in AP mode, the link was already created by userspace but not activated yet, it has a chandef but the chandef isn't valid and has no channel. Check for this and ignore this link.
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "246771497975678265840868053634189411220",
"length": 401.0
},
"target": {
"function": "cfg80211_off_channel_oper_allowed",
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2023-53113-0dd34f72",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87e80ea4fbc9ce2f2005905fdbcd38baaa47463a",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "246771497975678265840868053634189411220",
"length": 401.0
},
"target": {
"function": "cfg80211_off_channel_oper_allowed",
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2023-53113-57f0e4fc",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f624bb6fad23df3270580b4fcef415c6e7bf7705",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"269371167798724001451848339267656168737",
"311030223096101248844517475053751474025",
"32572926157101802340343125953715473614",
"238550131504217857806461869822385431178"
]
},
"target": {
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2023-53113-74168a03",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87e80ea4fbc9ce2f2005905fdbcd38baaa47463a",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"269371167798724001451848339267656168737",
"311030223096101248844517475053751474025",
"32572926157101802340343125953715473614",
"238550131504217857806461869822385431178"
]
},
"target": {
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2023-53113-7cce1852",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@201a836c2385fdd2b9d0a8e7737bba5b26f1863a",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "246771497975678265840868053634189411220",
"length": 401.0
},
"target": {
"function": "cfg80211_off_channel_oper_allowed",
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2023-53113-86e84697",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@201a836c2385fdd2b9d0a8e7737bba5b26f1863a",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"269371167798724001451848339267656168737",
"311030223096101248844517475053751474025",
"32572926157101802340343125953715473614",
"238550131504217857806461869822385431178"
]
},
"target": {
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2023-53113-a89858e4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f624bb6fad23df3270580b4fcef415c6e7bf7705",
"signature_type": "Line"
}
]