In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix gtk offload status event locking
The ath11k active pdevs are protected by RCU but the gtk offload status event handling code calling ath11kmacgetarvifbyvdevid() was not marked as a read-side critical section.
Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues.
Compile tested only.
{ "vanir_signatures": [ { "signature_version": "v1", "target": { "file": "drivers/net/wireless/ath/ath11k/wmi.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf9c7d783a2bf9305df4ef5b93d9063a52e18fca", "deprecated": false, "digest": { "line_hashes": [ "107615579370397009395674049520141608943", "260054427657208953737191089604267565741", "114892677842586521242540100668580965710", "146682649603879887044841389320320548322", "290122366238689602366814062623338823957", "280151636320410184725465311644408204492", "178392223844185207273207266624967511833", "297492569378988030320244547099950249996", "4930224300242218345332706961939923817", "1991588129745739221873944789885658719", "13928350748663158908908338875899803421", "86352855878825089527816231946387161180", "303358414230318510841800916453146859453" ], "threshold": 0.9 }, "id": "CVE-2023-52777-0e97764a" }, { "signature_version": "v1", "target": { "file": "drivers/net/wireless/ath/ath11k/wmi.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dea3c0720a146bd7193969f2847ccfed5be2221", "deprecated": false, "digest": { "line_hashes": [ "107615579370397009395674049520141608943", "260054427657208953737191089604267565741", "114892677842586521242540100668580965710", "146682649603879887044841389320320548322", "290122366238689602366814062623338823957", "280151636320410184725465311644408204492", "178392223844185207273207266624967511833", "297492569378988030320244547099950249996", "4930224300242218345332706961939923817", "1991588129745739221873944789885658719", "13928350748663158908908338875899803421", "86352855878825089527816231946387161180", "303358414230318510841800916453146859453" ], "threshold": 0.9 }, "id": "CVE-2023-52777-33002621" }, { "signature_version": "v1", "target": { "function": "ath11k_wmi_gtk_offload_status_event", "file": "drivers/net/wireless/ath/ath11k/wmi.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cf7577b6b3153b4b49deea9719fe43f96469c6d", "deprecated": false, "digest": { "length": 1098.0, "function_hash": "275242592731652906807389799972246292514" }, "id": "CVE-2023-52777-36143552" }, { "signature_version": "v1", "target": { "file": "drivers/net/wireless/ath/ath11k/wmi.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e83246ecd3b193f8d91fce778e8a5ba747fc7d8a", "deprecated": false, "digest": { "line_hashes": [ "107615579370397009395674049520141608943", "260054427657208953737191089604267565741", "114892677842586521242540100668580965710", "146682649603879887044841389320320548322", "290122366238689602366814062623338823957", "280151636320410184725465311644408204492", "178392223844185207273207266624967511833", "297492569378988030320244547099950249996", "4930224300242218345332706961939923817", "1991588129745739221873944789885658719", "13928350748663158908908338875899803421", "86352855878825089527816231946387161180", "303358414230318510841800916453146859453" ], "threshold": 0.9 }, "id": "CVE-2023-52777-749366b8" }, { "signature_version": "v1", "target": { "file": "drivers/net/wireless/ath/ath11k/wmi.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cf7577b6b3153b4b49deea9719fe43f96469c6d", "deprecated": false, "digest": { "line_hashes": [ "107615579370397009395674049520141608943", "260054427657208953737191089604267565741", "114892677842586521242540100668580965710", "146682649603879887044841389320320548322", "290122366238689602366814062623338823957", "280151636320410184725465311644408204492", "178392223844185207273207266624967511833", "107027531986779722836287987962985228733", "146552991878244224166775859100999680663", "1991588129745739221873944789885658719", "13928350748663158908908338875899803421", "86352855878825089527816231946387161180", "303358414230318510841800916453146859453" ], "threshold": 0.9 }, "id": "CVE-2023-52777-81f4dbd8" }, { "signature_version": "v1", "target": { "function": "ath11k_wmi_gtk_offload_status_event", "file": "drivers/net/wireless/ath/ath11k/wmi.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf9c7d783a2bf9305df4ef5b93d9063a52e18fca", "deprecated": false, "digest": { "length": 1094.0, "function_hash": "34260779679125573796036957080728810357" }, "id": "CVE-2023-52777-8a8a7b44" }, { "signature_version": "v1", "target": { "function": "ath11k_wmi_gtk_offload_status_event", "file": "drivers/net/wireless/ath/ath11k/wmi.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dea3c0720a146bd7193969f2847ccfed5be2221", "deprecated": false, "digest": { "length": 1094.0, "function_hash": "34260779679125573796036957080728810357" }, "id": "CVE-2023-52777-9d8a4813" }, { "signature_version": "v1", "target": { "function": "ath11k_wmi_gtk_offload_status_event", "file": "drivers/net/wireless/ath/ath11k/wmi.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e83246ecd3b193f8d91fce778e8a5ba747fc7d8a", "deprecated": false, "digest": { "length": 1094.0, "function_hash": "34260779679125573796036957080728810357" }, "id": "CVE-2023-52777-d88f68c2" } ] }