First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() We can get a UBSAN warning if ieee80211_get_tx_power() returns the INT_MIN value mac80211 internally uses for "unset power level". UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5 -2147483648 * 100 cannot be represented in type 'int' CPU: 0 PID: 20433 Comm: insmod Tainted: G WC OE Call Trace: dump_stack+0x74/0x92 ubsan_epilogue+0x9/0x50 handle_overflow+0x8d/0xd0 __ubsan_handle_mul_overflow+0xe/0x10 nl80211_send_iface+0x688/0x6b0 [cfg80211] [...] cfg80211_register_wdev+0x78/0xb0 [cfg80211] cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211] [...] ieee80211_if_add+0x60e/0x8f0 [mac80211] ieee80211_register_hw+0xda5/0x1170 [mac80211] In this case, simply return an error instead, to indicate that no data is available.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.14.331 | 4.14.331 |
redhat/kernel | <4.19.300 | 4.19.300 |
redhat/kernel | <5.4.262 | 5.4.262 |
redhat/kernel | <5.10.202 | 5.10.202 |
redhat/kernel | <5.15.140 | 5.15.140 |
redhat/kernel | <6.1.64 | 6.1.64 |
redhat/kernel | <6.5.13 | 6.5.13 |
redhat/kernel | <6.6.3 | 6.6.3 |
redhat/kernel | <6.7 | 6.7 |
Linux Kernel | <4.14.331 | |
Linux Kernel | >=4.15<4.19.300 | |
Linux Kernel | >=4.20<5.4.262 | |
Linux Kernel | >=5.5<5.10.202 | |
Linux Kernel | >=5.11<5.15.140 | |
Linux Kernel | >=5.16<6.1.64 | |
Linux Kernel | >=6.2<6.5.13 | |
Linux Kernel | >=6.6<6.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52832 is classified as a potential integrity vulnerability within the Linux kernel.
To resolve CVE-2023-52832, update the Linux kernel to versions 4.14.331, 4.19.300, 5.4.262, 5.10.202, 5.15.140, 6.1.64, 6.5.13, 6.6.3, or 6.7 as appropriate.
CVE-2023-52832 affects multiple Linux kernel versions including those prior to 4.14.331, 4.19.300, 5.4.262, 5.10.202, 5.15.140, 6.1.64, 6.5.13, 6.6.3, and 6.7.
Exploiting CVE-2023-52832 could lead to a potentially undefined behavior or a warning from UBSAN when the power level is not set.
CVE-2023-52832 primarily affects the Red Hat distribution of the Linux kernel but can impact any system using the vulnerable kernel versions.