CVE-2023-53153
15.09.2025, 14:15
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Fix use after free for wext Key information in wext.connect is not reset on (re)connect and can hold data from a previous connection. Reset key data to avoid that drivers or mac80211 incorrectly detect a WEP connection request and access the freed or already reused memory. Additionally optimize cfg80211_sme_connect() and avoid an useless schedule of conn_work.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 2.6.32 ≤ 𝑥 < 4.14.308 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.276 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.235 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.173 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.99 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.16 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.2.3 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References