VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53822

CVE-2023-53822

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: Ignore frags from uninitialized peer in dp.

When max virtual ap interfaces are configured in all the bands with ACS and hostapd restart is done every 60s, a crash is observed at random times. In this certain scenario, a fragmented packet is received for self peer, for which rx_tid and rx_frags are not initialized in datapath. While handling this fragment, crash is observed as the rx_frag list is uninitialised and when we walk in ath11k_dp_rx_h_sort_frags, skb null leads to exception.

To address this, before processing received fragments we check dp_setup_done flag is set to ensure that peer has completed its dp peer setup for fragment queue, else ignore processing the fragments.

Call trace: ath11k_dp_process_rx_err+0x550/0x1084 [ath11k] ath11k_dp_service_srng+0x70/0x370 [ath11k] 0xffffffc009693a04 __napi_poll+0x30/0xa4 net_rx_action+0x118/0x270 __do_softirq+0x10c/0x244 irq_exit+0x64/0xb4 __handle_domain_irq+0x88/0xac gic_handle_irq+0x74/0xbc el1_irq+0xf0/0x1c0 arch_cpu_idle+0x10/0x18 do_idle+0x104/0x248 cpu_startup_entry+0x20/0x64 rest_init+0xd0/0xdc arch_call_rest_init+0xc/0x14 start_kernel+0x480/0x4b8 Code: f9400281 f94066a2 91405021 b94a0023 (f9406401)

Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A denial-of-service vulnerability in ath11k driver when uninitialized peer fragment data causes a kernel crash.

Vulnerability

Overview

The issue occurs in the Linux kernel's ath11k Wi-Fi driver, specifically in the datapath (dp) when processing fragmented packets for a self peer that has not yet completed its DP peer setup. The rx_tid and rx_frags structures remain uninitialized during this window, leading to a NULL pointer dereference when the kernel attempts to walk the rx_frag list in ath11k_dp_rx_h_sort_frags [1].

Exploitation

Conditions

An attacker on the same Wi-Fi network can trigger this bug by sending a fragmented packet to the vulnerable device under specific conditions: when maximum virtual AP interfaces are configured across all bands with ACS (Automatic Channel Selection), and hostapd is restarted every 60 seconds [1]. The race condition between peer initialization and reception of a fragmented packet for that peer makes the driver process data from an uninitialized peer's fragment queue.

Impact

Successful exploitation leads to a kernel panic, causing a denial of service (DoS) on the affected device. The crash trace shows the exception occurs within ath11k_dp_process_rx_err while handling the fragmented frame, ultimately crashing the system and disrupting Wi-Fi services [1].

Mitigation

Status

The fix was committed to the Linux kernel stable tree, adding a check for the dp_setup_done flag before processing fragments. If the peer has not completed its fragment queue setup, the driver now ignores the fragments, preventing the crash [1]. Users should apply the latest stable kernel updates containing this commit (a06bfb3c9f69f303692cdae87bc0899d2ae8b2a6).

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.