We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix gtk offload status event locking The ath11k active pdevs are protected by RCU but the gtk offload status event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.
Reserved 2024-05-21 | Published 2024-05-21 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/0cf7577b6b3153b4b49deea9719fe43f96469c6d
git.kernel.org/...c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca
git.kernel.org/...c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a
git.kernel.org/...c/1dea3c0720a146bd7193969f2847ccfed5be2221
Support options