We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-52777

wifi: ath11k: fix gtk offload status event locking



Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix gtk offload status event locking The ath11k active pdevs are protected by RCU but the gtk offload status event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.

Reserved 2024-05-21 | Published 2024-05-21 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

a16d9b50cfbaf112401b8e5ccfa852709f498cd4 before 0cf7577b6b3153b4b49deea9719fe43f96469c6d
affected

a16d9b50cfbaf112401b8e5ccfa852709f498cd4 before cf9c7d783a2bf9305df4ef5b93d9063a52e18fca
affected

a16d9b50cfbaf112401b8e5ccfa852709f498cd4 before e83246ecd3b193f8d91fce778e8a5ba747fc7d8a
affected

a16d9b50cfbaf112401b8e5ccfa852709f498cd4 before 1dea3c0720a146bd7193969f2847ccfed5be2221
affected

Default status
affected

5.19
affected

Any version before 5.19
unaffected

6.1.64
unaffected

6.5.13
unaffected

6.6.3
unaffected

6.7
unaffected

References

git.kernel.org/...c/0cf7577b6b3153b4b49deea9719fe43f96469c6d

git.kernel.org/...c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca

git.kernel.org/...c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a

git.kernel.org/...c/1dea3c0720a146bd7193969f2847ccfed5be2221

cve.org (CVE-2023-52777)

nvd.nist.gov (CVE-2023-52777)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-52777

Support options

Helpdesk Chat, Email, Knowledgebase