CVE-2023-52798

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix dfs radar event locking The ath11k active pdevs are protected by RCU but the DFS radar event handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 Apr 2025, 15:02

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822 - () https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822 - Patch
References () https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5 - () https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5 - Patch
References () https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e - () https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e - Patch
References () https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82 - () https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82 - Patch
References () https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec - () https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec - Patch
References () https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10 - () https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10 - Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822 - () https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822 -
References () https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5 - () https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5 -
References () https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e - () https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e -
References () https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82 - () https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82 -
References () https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec - () https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec -
References () https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10 - () https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10 -

14 Nov 2024, 08:35

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: wifi: ath11k: corrige el bloqueo de eventos de radar dfs. Los pdevs activos de ath11k están protegidos por RCU, pero el código de manejo de eventos de radar DFS que llama a ath11k_mac_get_ar_by_pdev_id() no se marcó como una sección crítica del lado de lectura . Marque el código en cuestión como una sección crítica del lado de lectura de RCU para evitar posibles problemas de use after free. Compilación probada únicamente.

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-04-02 15:02


NVD link : CVE-2023-52798

Mitre link : CVE-2023-52798

CVE.ORG link : CVE-2023-52798


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free