Vulnerabilities > CVE-2023-52777 - Use After Free vulnerability in Linux Kernel
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix gtk offload status event locking The ath11k active pdevs are protected by RCU but the gtk offload status event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d
- https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d
- https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221
- https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221
- https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca
- https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca
- https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a
- https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a