CVE-2023-52777

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix gtk offload status event locking The ath11k active pdevs are protected by RCU but the gtk offload status event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Jan 2025, 17:29

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d - () https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d - Patch
References () https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221 - () https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221 - Patch
References () https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca - () https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca - Patch
References () https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a - () https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416

21 Nov 2024, 08:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: wifi: ath11k: corrige el bloqueo de eventos de estado de descarga de gtk. Los pdevs activos de ath11k están protegidos por RCU, pero el código de manejo de eventos de estado de descarga de gtk que llama a ath11k_mac_get_arvif_by_vdev_id() no se marcó como lado de lectura sección crítica. Marque el código en cuestión como una sección crítica del lado de lectura de RCU para evitar posibles problemas de use after free. Compilación probada únicamente.
References () https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d - () https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d -
References () https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221 - () https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221 -
References () https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca - () https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca -
References () https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a - () https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a -

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-01-14 17:29


NVD link : CVE-2023-52777

Mitre link : CVE-2023-52777

CVE.ORG link : CVE-2023-52777


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free