First published: Thu Dec 21 2023(Updated: )
A null pointer dereference vulnerability in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel, which could be exploited to trigger denial of service. Refer: <a href="https://patchwork.kernel.org/project/linux-wireless/patch/20231208043433.271449-1-hdthky0@gmail.com/">https://patchwork.kernel.org/project/linux-wireless/patch/20231208043433.271449-1-hdthky0@gmail.com/</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
https://patchwork.kernel.org/project/linux-wireless/patch/20231208043433.271449-1-hdthky0@gmail.com/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7042 is classified as a denial of service vulnerability that could impact system availability.
To fix CVE-2023-7042, update the Linux kernel to a version that is not affected, such as 5.10.223-1, 6.1.123-1, or later versions.
CVE-2023-7042 affects multiple versions of the Linux kernel, specifically versions prior to the patches in 5.10.223-1 and 6.1.123-1.
CVE-2023-7042 can be exploited to perform denial of service attacks, potentially leading to system crashes.
CVE-2023-7042 may be exploited easily if the attacker can send crafted management packets to the vulnerable system.