CVE-2023-52769

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix htt mlo-offset event locking The ath12k active pdevs are protected by RCU but the htt mlo-offset event handling code calling ath12k_mac_get_ar_by_pdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/6afc57ea315e0f660b1f870a681737bb7b71faef - Patch () https://git.kernel.org/stable/c/6afc57ea315e0f660b1f870a681737bb7b71faef - Patch
References () https://git.kernel.org/stable/c/afd3425bd69610f318403084fe491e24a1357fb9 - Patch () https://git.kernel.org/stable/c/afd3425bd69610f318403084fe491e24a1357fb9 - Patch
References () https://git.kernel.org/stable/c/d908ca431e20b0e4bfc5d911d1744910ed779bdb - Patch () https://git.kernel.org/stable/c/d908ca431e20b0e4bfc5d911d1744910ed779bdb - Patch

24 May 2024, 01:13

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/6afc57ea315e0f660b1f870a681737bb7b71faef - () https://git.kernel.org/stable/c/6afc57ea315e0f660b1f870a681737bb7b71faef - Patch
References () https://git.kernel.org/stable/c/afd3425bd69610f318403084fe491e24a1357fb9 - () https://git.kernel.org/stable/c/afd3425bd69610f318403084fe491e24a1357fb9 - Patch
References () https://git.kernel.org/stable/c/d908ca431e20b0e4bfc5d911d1744910ed779bdb - () https://git.kernel.org/stable/c/d908ca431e20b0e4bfc5d911d1744910ed779bdb - Patch
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: wifi: ath12k: corrige el bloqueo de eventos htt mlo-offset Los pdevs activos de ath12k están protegidos por RCU, pero el código de manejo de eventos htt mlo-offset que llama a ath12k_mac_get_ar_by_pdev_id() no se marcó como read-side de Sección crítica. Marque el código en cuestión como una sección crítica del lado de lectura de RCU para evitar posibles problemas de use after free. Compilación probada únicamente.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2024-11-21 08:40


NVD link : CVE-2023-52769

Mitre link : CVE-2023-52769

CVE.ORG link : CVE-2023-52769


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free