THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2023-52777

wifi: ath11k: fix gtk offload status event locking

Reserved:2024-05-21
Published:2024-05-21
Updated:2024-06-11

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix gtk offload status event locking The ath11k active pdevs are protected by RCU but the gtk offload status event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.

Product status

Default status
unaffected

a16d9b50cfba before 0cf7577b6b31
affected

a16d9b50cfba before cf9c7d783a2b
affected

a16d9b50cfba before e83246ecd3b1
affected

a16d9b50cfba before 1dea3c0720a1
affected

Default status
affected

5.19
affected

Any version before 5.19
unaffected

6.1.64
unaffected

6.5.13
unaffected

6.6.3
unaffected

6.7
unaffected

References

https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d

https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca

https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a

https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221

cve.org CVE-2023-52777

nvd.nist.gov CVE-2023-52777

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-52777