First published: Wed Mar 06 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2023-52595">CVE-2023-52595</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52595-d018@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52595-d018@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.4.269 | 5.4.269 |
redhat/kernel | <5.10.210 | 5.10.210 |
redhat/kernel | <5.15.149 | 5.15.149 |
redhat/kernel | <6.1.77 | 6.1.77 |
redhat/kernel | <6.6.16 | 6.6.16 |
redhat/kernel | <6.7.4 | 6.7.4 |
redhat/kernel | <6.8 | 6.8 |
Linux Kernel | <5.4.269 | |
Linux Kernel | >=5.5<5.10.210 | |
Linux Kernel | >=5.11<5.15.149 | |
Linux Kernel | >=5.16<6.1.77 | |
Linux Kernel | >=6.2<6.6.16 | |
Linux Kernel | >=6.7<6.7.4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52595 has been classified with moderate severity as it pertains to a vulnerability in the Linux kernel's handling of hardware resets.
To address CVE-2023-52595, update the Linux kernel to one of the patched versions, such as 5.4.269, 5.10.210, 5.15.149, 6.1.77, 6.6.16, 6.7.4, or newer.
CVE-2023-52595 affects several Linux kernel versions, including 5.4 up to 5.4.269, 5.10 up to 5.10.210, 5.15 up to 5.15.149, and other versions up to 6.1.77.
The vulnerability affects the rt2x00 driver in the Linux kernel, specifically related to the beacon queue during hardware resets.
As of now, there is no publicly disclosed exploit for CVE-2023-52595, but it is advisable to apply mitigations promptly.