{"uuid": "c297980b-5f68-4344-a7f0-f26f6991a6ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52593", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16993", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52593\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()\n\nSince 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()'\nshould check the return value before examining skb data. So convert\nthe latter to return an appropriate error code and propagate it to\nreturn from 'wfx_start_ap()' as well. Compile tested only.\n\ud83d\udccf Published: 2024-03-06T06:45:24.551Z\n\ud83d\udccf Modified: 2025-05-20T14:27:28.879Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/574dcd3126aa2eed75437137843f254b1190dd03\n2. https://git.kernel.org/stable/c/9ab224744a47363f74ea29c6894c405e3bcf5132\n3. https://git.kernel.org/stable/c/3739121443f5114c6bcf6d841a5124deb006b878\n4. https://git.kernel.org/stable/c/fe0a7776d4d19e613bb8dd80fe2d78ae49e8b49d", "creation_timestamp": "2025-05-20T14:40:59.000000Z"}