In the Linux kernel, the following vulnerability has been resolved: wifi:
ath11k: fix dfs radar event locking The ath11k active pdevs are protected
by RCU but the DFS radar event handling code calling
ath11k_mac_get_ar_by_pdev_id() was not marked as a read-side critical
section. Mark the code in question as an RCU read-side critical section to
avoid any potential use-after-free issues. Compile tested only.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-fde | < 5.15.0-1058.66.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-fde-5.15 | < 5.15.0-1058.66~20.04.2.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gcp | < any | UNKNOWN |
git.kernel.org/linus/3b6c14833165f689cc5928574ebafe52bbce5f1e (6.7-rc1)
git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822
git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5
git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e
git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82
git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec
git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10
launchpad.net/bugs/cve/CVE-2023-52798
nvd.nist.gov/vuln/detail/CVE-2023-52798
security-tracker.debian.org/tracker/CVE-2023-52798
www.cve.org/CVERecord?id=CVE-2023-52798