In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix dfs radar event locking
The ath11k active pdevs are protected by RCU but the DFS radar event
handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.
Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.
Compile tested only.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 04 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Sep 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:8 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T15:31:11.628Z
Updated: 2024-11-13T17:59:26.946Z
Reserved: 2024-05-21T15:19:24.246Z
Link: CVE-2023-52798
Vulnrichment
Updated: 2024-08-02T23:11:35.920Z
NVD
Status : Awaiting Analysis
Published: 2024-05-21T16:15:18.370
Modified: 2024-11-14T08:35:05.620
Link: CVE-2023-52798
Redhat