CVE-2023-53153

Updated: 2025-11-30 04:23:47.509853

Description:

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Fix use after free for wext Key information in wext.connect is not reset on (re)connect and can hold data from a previous connection. Reset key data to avoid that drivers or mac80211 incorrectly detect a WEP connection request and access the freed or already reused memory. Additionally optimize cfg80211_sme_connect() and avoid an useless schedule of conn_work.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1765463110 2025-12-11 15:30:56
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Released CLSA-2026:1768669128 2026-01-28 12:51:57
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2025-11-30 10:14:50
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2026-01-17 01:33:42
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Released CLSA-2026:1769610819 2026-01-28 21:16:35
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Needs Triage 2025-11-30 09:05:50
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Needs Triage 2025-11-30 09:18:38
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Needs Triage 2025-11-30 09:18:37