U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-54300 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx For the reasons also described in commit b383e8abed41 ("wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()"), ath9k_htc_rx_msg() should validate pkt_len before accessing the SKB. For example, the obtained SKB may have been badly constructed with pkt_len = 8. In this case, the SKB can only contain a valid htc_frame_hdr but after being processed in ath9k_htc_rx_msg() and passed to ath9k_wmi_ctrl_rx() endpoint RX handler, it is expected to have a WMI command header which should be located inside its data payload. Implement sanity checking inside ath9k_wmi_ctrl_rx(). Otherwise, uninit memory can be referenced. Tested on Qualcomm Atheros Communications AR9271 802.11n . Found by Linux Verification Center (linuxtesting.org) with Syzkaller.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0bc12e41af4e3ae1f0efecc377f0514459df0707 kernel.org
https://git.kernel.org/stable/c/250efb4d3f5b32a115ea6bf25437ba44a1b3c04f kernel.org
https://git.kernel.org/stable/c/28259ce4f1f1f9ab37fa817756c89098213d2fc0 kernel.org
https://git.kernel.org/stable/c/75acec91aeaa07375cd5f418069e61b16d39bbad kernel.org
https://git.kernel.org/stable/c/8ed572e52714593b209e3aa352406aff84481179 kernel.org
https://git.kernel.org/stable/c/90e3c10177573b8662ac9858abd9bf731d5d98e0 kernel.org
https://git.kernel.org/stable/c/ad5425e70789c29b93acafb5bb4629e4eb908296 kernel.org
https://git.kernel.org/stable/c/d1c2ff2bd84c3692c9df267a2b991ce92bfca8ef kernel.org
https://git.kernel.org/stable/c/f24292e827088bba8de7158501ac25a59b064953 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-54300
NVD Published Date:
12/30/2025
NVD Last Modified:
12/30/2025
Source:
kernel.org