In the Linux kernel, the following vulnerability has been resolved:
wifi: rt2x00: restart beacon queue when hardware reset
When a hardware reset is triggered, all registers are reset, so all
queues are forced to stop in hardware interface. However, mac80211
will not automatically stop the queue. If we don't manually stop the
beacon queue, the queue will be deadlocked and unable to start again.
This patch fixes the issue where Apple devices cannot connect to the
AP after calling ieee80211_restart_hw().
References
Configurations
Configuration 1 (hide)
|
History
12 Dec 2024, 15:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83 - Patch | |
References | () https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c - Patch | |
References | () https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e - Patch | |
References | () https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957 - Patch | |
References | () https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8 - Patch | |
References | () https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48 - Patch | |
References | () https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-667 |
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83 - | |
References | () https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c - | |
References | () https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e - | |
References | () https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957 - | |
References | () https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8 - | |
References | () https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48 - | |
References | () https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb - |
04 Nov 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Mar 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-06 07:15
Updated : 2024-12-12 15:10
NVD link : CVE-2023-52595
Mitre link : CVE-2023-52595
CVE.ORG link : CVE-2023-52595
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking