CVE-2023-52530

Source
https://cve.org/CVERecord?id=CVE-2023-52530
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52530.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52530
Downstream
Related
Published
2024-03-02T21:52:34.966Z
Modified
2026-03-20T12:32:35.999366Z
Summary
wifi: mac80211: fix potential key use-after-free
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix potential key use-after-free

When ieee80211keylink() is called by ieee80211gtkrekeyadd() but returns 0 due to KRACK protection (identical key reinstall), ieee80211gtkrekeyadd() will still return a pointer into the key, in a potential use-after-free. This normally doesn't happen since it's only called by iwlwifi in case of WoWLAN rekey offload which has its own KRACK protection, but still better to fix, do that by returning an error code and converting that to success on the cfg80211 boundary only, leaving the error for bad callers of ieee80211gtkrekey_add().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52530.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
Fixed
2408f491ff998d674707725eadc47d8930aced09
Fixed
e8e599a635066c50ac214c3e10858f1d37e03022
Fixed
e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0
Fixed
2f4e16e39e4f5e78248dd9e51276a83203950b36
Fixed
65c72a7201704574dace708cbc96a8f367b1491d
Fixed
31db78a4923ef5e2008f2eed321811ca79e7f71b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
ef810e7c3d2a8fb3bbd23726599c487c30ea747e
Last affected
a0a8a11d1630cd648dc1ce86da620b4e240e0315
Last affected
6891c6fd2a500d1f39d1426765f610bdc2c2a39d
Last affected
003aa22c9619b49efe950aca3aebd1235a04940d
Last affected
6440f0ee8a1779f53526bccb9de00914daeb9094
Last affected
2586fa0007dc6b7745da14250be7e3aae706b128
Last affected
a9ab1b2e30e898440a22d7b1d7a5b0b7c6a8791f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52530.json"