In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix htt pktlog locking
The ath11k active pdevs are protected by RCU but the htt pktlog handling code calling ath11kmacgetarbypdevid() was not marked as a read-side critical section.
Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues.
Compile tested only.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52800.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52800.json"
[
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@03ed26935bebf6b6fd8a656490bf3dcc71b72679",
"digest": {
"function_hash": "240335981586354395264925792233752771385",
"length": 438.0
},
"id": "CVE-2023-52800-15cc78e7",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/dp_rx.c",
"function": "ath11k_htt_pktlog"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@03ed26935bebf6b6fd8a656490bf3dcc71b72679",
"digest": {
"line_hashes": [
"95389278621629596384215313158933302211",
"9574083129818841273669773028241804798",
"275372967746905481960467490589010089909",
"329601771325443919373079542431041069327",
"238575095252924029310641469065640510070",
"197439369294431567233503235835712649812",
"310325755242241372355663141209306660596",
"199638646474971756095678312113099936583",
"19913762626870413706200210682112022599",
"126649231392119958632619871243768403584",
"129921603265502979222339700808310717098"
],
"threshold": 0.9
},
"id": "CVE-2023-52800-69739dce",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/dp_rx.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@423762f021825b5e57c3d6f01ff96a9ff19cdcd8",
"digest": {
"function_hash": "240335981586354395264925792233752771385",
"length": 438.0
},
"id": "CVE-2023-52800-943a1094",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/dp_rx.c",
"function": "ath11k_htt_pktlog"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@423762f021825b5e57c3d6f01ff96a9ff19cdcd8",
"digest": {
"line_hashes": [
"95389278621629596384215313158933302211",
"9574083129818841273669773028241804798",
"275372967746905481960467490589010089909",
"329601771325443919373079542431041069327",
"238575095252924029310641469065640510070",
"197439369294431567233503235835712649812",
"310325755242241372355663141209306660596",
"199638646474971756095678312113099936583",
"19913762626870413706200210682112022599",
"126649231392119958632619871243768403584",
"129921603265502979222339700808310717098"
],
"threshold": 0.9
},
"id": "CVE-2023-52800-95837787",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/dp_rx.c"
}
}
]