First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dfs-radar and temperature event locking The ath12k active pdevs are protected by RCU but the DFS-radar and temperature event handling code calling ath12k_mac_get_ar_by_pdev_id() was not marked as a read-side critical section. Mark the code in question as RCU read-side critical sections to avoid any potential use-after-free issues. Note that the temperature event handler looks like a place holder currently but would still trigger an RCU lockdep splat. Compile tested only.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.3<6.5.13 | |
Linux Kernel | >=6.6<6.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52776 has been classified with a severity level that indicates it could potentially impact the stability of the Linux kernel's wifi functionality.
To resolve CVE-2023-52776, update your Linux kernel to versions above 6.5.13 or 6.6.3.
CVE-2023-52776 affects Linux kernel versions 6.3 up to 6.5.13 and 6.6 up to 6.6.3.
CVE-2023-52776 involves the ath12k driver within the Linux kernel.
CVE-2023-52776 is considered a significant vulnerability due to its implications for wifi event handling in the Linux kernel.