CVE-2023-52798

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52798
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52798.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52798
Downstream
Related
Published
2024-05-21T15:31:11.628Z
Modified
2025-11-28T02:34:29.612067Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
wifi: ath11k: fix dfs radar event locking
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix dfs radar event locking

The ath11k active pdevs are protected by RCU but the DFS radar event handling code calling ath11kmacgetarbypdevid() was not marked as a read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues.

Compile tested only.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52798.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d5c65159f2895379e11ca13f62feabe93278985d
Fixed
f882f51905517575c9f793a3dff567af90ef9a10
Fixed
426e718ce9ba60013364a54233feee309356cb82
Fixed
ca420ac4f9451f22347bae44b18ab47ba2c267ec
Fixed
1fd878e1750190a612b5de2af357cca422ec0822
Fixed
21ebb0aba580d347e12f01ce5f6e75044427b3d5
Fixed
3b6c14833165f689cc5928574ebafe52bbce5f1e

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6.0
Fixed
5.10.202
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.140
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.64
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.13
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.3