CVE-2023-52800

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52800
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52800.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52800
Downstream
Related
Published
2024-05-21T15:31:13.033Z
Modified
2025-11-28T02:35:15.663018Z
Severity
  • 4.4 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
wifi: ath11k: fix htt pktlog locking
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix htt pktlog locking

The ath11k active pdevs are protected by RCU but the htt pktlog handling code calling ath11kmacgetarbypdevid() was not marked as a read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues.

Compile tested only.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52800.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d5c65159f2895379e11ca13f62feabe93278985d
Fixed
03ed26935bebf6b6fd8a656490bf3dcc71b72679
Fixed
3a51e6b4da71fdfa43ec006d6abc020f3e22d14e
Fixed
e3199b3fac65c9f103055390b6fd07c5cffa5961
Fixed
423762f021825b5e57c3d6f01ff96a9ff19cdcd8
Fixed
69cede2a5a5f60e3f5602b901b52cb64edd2ea6c
Fixed
3f77c7d605b29df277d77e9ee75d96e7ad145d2d

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6.0
Fixed
5.10.202
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.140
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.64
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.13
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.3