摘要:
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix gtk offload status event locking
The ath11k active pdevs are protected by RCU but the gtk offload status
event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not
marked as a read-side critical section.
Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.
Compile tested only.
安全等级: Low
公告ID: KylinSec-SA-2024-2613
发布日期: 2024年6月5日
关联CVE: CVE-2023-52777
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix gtk offload status event locking
The ath11k active pdevs are protected by RCU but the gtk offload status
event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not
marked as a read-side critical section.
Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.
Compile tested only.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-52777 | KY3.4-5 | kernel | Unaffected |
CVE-2023-52777 | KY3.5.3 | kernel | Unaffected |
CVE-2023-52777 | V6 | kernel | Unaffected |