{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53153","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-05-02T15:51:43.566Z","datePublished":"2025-09-15T14:03:21.590Z","dateUpdated":"2026-05-11T19:39:28.381Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:39:28.381Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Fix use after free for wext\n\nKey information in wext.connect is not reset on (re)connect and can hold\ndata from a previous connection.\n\nReset key data to avoid that drivers or mac80211 incorrectly detect a\nWEP connection request and access the freed or already reused memory.\n\nAdditionally optimize cfg80211_sme_connect() and avoid an useless\nschedule of conn_work."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/wireless/sme.c"],"versions":[{"version":"fffd0934b9390f34bec45762192b7edd3b12b4b5","lessThan":"66af4a2ab1d65d556d638cb9555a3b823c2557a9","status":"affected","versionType":"git"},{"version":"fffd0934b9390f34bec45762192b7edd3b12b4b5","lessThan":"a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6","status":"affected","versionType":"git"},{"version":"fffd0934b9390f34bec45762192b7edd3b12b4b5","lessThan":"6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2","status":"affected","versionType":"git"},{"version":"fffd0934b9390f34bec45762192b7edd3b12b4b5","lessThan":"2cfe78619b0de6d2da773978bc2d22797212eaa7","status":"affected","versionType":"git"},{"version":"fffd0934b9390f34bec45762192b7edd3b12b4b5","lessThan":"fd081afd21eb35b968b0330700c43ec94986e1c4","status":"affected","versionType":"git"},{"version":"fffd0934b9390f34bec45762192b7edd3b12b4b5","lessThan":"22dfb21bf1cd876616d45cda1bc6daa89eec6747","status":"affected","versionType":"git"},{"version":"fffd0934b9390f34bec45762192b7edd3b12b4b5","lessThan":"f4b6a138efb8a32507b8946104e32cb926308da7","status":"affected","versionType":"git"},{"version":"fffd0934b9390f34bec45762192b7edd3b12b4b5","lessThan":"015b8cc5e7c4d7bb671f1984d7b7338c310b185b","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/wireless/sme.c"],"versions":[{"version":"2.6.32","status":"affected"},{"version":"0","lessThan":"2.6.32","status":"unaffected","versionType":"semver"},{"version":"4.14.308","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.276","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.235","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.173","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.99","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.16","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.3","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.32","versionEndExcluding":"4.14.308"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.32","versionEndExcluding":"4.19.276"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.32","versionEndExcluding":"5.4.235"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.32","versionEndExcluding":"5.10.173"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.32","versionEndExcluding":"5.15.99"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.32","versionEndExcluding":"6.1.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.32","versionEndExcluding":"6.2.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.32","versionEndExcluding":"6.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9"},{"url":"https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6"},{"url":"https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2"},{"url":"https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7"},{"url":"https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4"},{"url":"https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747"},{"url":"https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7"},{"url":"https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b"}],"title":"wifi: cfg80211: Fix use after free for wext","x_generator":{"engine":"bippy-1.2.0"}}}}