In the Linux kernel, the following vulnerability has been resolved: wifi:
b43: Stop/wake correct queue in DMA Tx path when QoS is disabled When QoS
is disabled, the queue priority value will not map to the correct ieee80211
queue since there is only one queue. Stop/wake queue 0 when QoS is disabled
to prevent trying to stop/wake a non-existent queue and failing to
stop/wake the actual queue instantiated. Log of issue before change (with
kernel parameter qos=0): [ +5.112651] ------------[ cut here ]------------
[ +0.000005] WARNING: CPU: 7 PID: 25513 at net/mac80211/util.c:449
__ieee80211_wake_queue+0xd5/0x180 [mac80211] [ +0.000067] Modules linked
in: b43(O) snd_seq_dummy snd_hrtimer snd_seq snd_seq_device nft_chain_nat
xt_MASQUERADE nf_nat xfrm_user xfrm_algo xt_addrtype overlay ccm af_packet
amdgpu snd_hda_codec_cirrus snd_hda_codec_generic ledtrig_audio drm_exec
amdxcp gpu_sched xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4
ip6t_rpfilter ipt_rpfilter xt_pkttype xt_LOG nf_log_syslog xt_tcpudp
nft_compat nf_tables nfnetlink sch_fq_codel btusb uinput iTCO_wdt ctr btrtl
intel_pmc_bxt i915 intel_rapl_msr mei_hdcp mei_pxp joydev at24 watchdog
btintel atkbd libps2 serio radeon btbcm vivaldi_fmap btmtk
intel_rapl_common snd_hda_codec_hdmi bluetooth uvcvideo nls_iso8859_1
applesmc nls_cp437 x86_pkg_temp_thermal snd_hda_intel intel_powerclamp vfat
videobuf2_vmalloc coretemp fat snd_intel_dspcfg crc32_pclmul uvc
polyval_clmulni snd_intel_sdw_acpi loop videobuf2_memops snd_hda_codec tun
drm_suballoc_helper polyval_generic drm_ttm_helper drm_buddy tap
ecdh_generic videobuf2_v4l2 gf128mul macvlan ttm ghash_clmulni_intel ecc
tg3 [ +0.000044] videodev bridge snd_hda_core rapl crc16 drm_display_helper
cec mousedev snd_hwdep evdev intel_cstate bcm5974 hid_appleir
videobuf2_common stp mac_hid libphy snd_pcm drm_kms_helper acpi_als mei_me
intel_uncore llc mc snd_timer intel_gtt industrialio_triggered_buffer
apple_mfi_fastcharge i2c_i801 mei snd lpc_ich agpgart ptp i2c_smbus
thunderbolt apple_gmux i2c_algo_bit kfifo_buf video industrialio soundcore
pps_core wmi tiny_power_button sbs sbshc button ac cordic bcma mac80211
cfg80211 ssb rfkill libarc4 kvm_intel kvm drm irqbypass fuse backlight
firmware_class efi_pstore configfs efivarfs dmi_sysfs ip_tables x_tables
autofs4 dm_crypt cbc encrypted_keys trusted asn1_encoder tee tpm rng_core
input_leds hid_apple led_class hid_generic usbhid hid sd_mod t10_pi
crc64_rocksoft crc64 crc_t10dif crct10dif_generic ahci libahci libata
uhci_hcd ehci_pci ehci_hcd crct10dif_pclmul crct10dif_common sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel usbcore scsi_mod libaes
crypto_simd cryptd scsi_common [ +0.000055] usb_common rtc_cmos btrfs
blake2b_generic libcrc32c crc32c_generic crc32c_intel xor raid6_pq
dm_snapshot dm_bufio dm_mod dax [last unloaded: b43(O)] [ +0.000009] CPU: 7
PID: 25513 Comm: irq/17-b43 Tainted: G W O 6.6.7 #1-NixOS [ +0.000003]
Hardware name: Apple Inc. MacBookPro8,3/Mac-942459F5819B171B, BIOS
87.0.0.0.0 06/13/2019 [ +0.000001] RIP:
0010:__ieee80211_wake_queue+0xd5/0x180 [mac80211] [ +0.000046] Code: 00 45
85 e4 0f 85 9b 00 00 00 48 8d bd 40 09 00 00 f0 48 0f ba ad 48 09 00 00 00
72 0f 5b 5d 41 5c 41 5d 41 5e e9 cb 6d 3c d0 <0f> 0b 5b 5d 41 5c 41 5d 41
5e c3 cc cc cc cc 48 8d b4 16 94 00 00 [ +0.000002] RSP:
0018:ffffc90003c77d60 EFLAGS: 00010097 [ +0.000001] RAX: 0000000000000001
RBX: 0000000000000002 RCX: 0000000000000000 [ +0.000001] RDX:
0000000000000000 RSI: 0000000000000002 RDI: ffff88820b924900 [ +0.000002]
RBP: ffff88820b924900 R08: ffffc90003c77d90 R09: 000000000003bfd0 [
+0.000001] R10: ffff88820b924900 R11: ffffc90003c77c68 R12:
0000000000000000 [ +0.000001] R13: 0000000000000000 R14: ffffc90003c77d90
R15: ffffffffc0fa6f40 [ +0.000001] FS: 0000000000000000(0000)
GS:ffff88846fb80000(0000) knlGS:0000000000000000 [ +0.000001] CS: 0010 DS:
0 —truncated—
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-189.209 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < 6.8.0-35.35 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1128.138 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < 6.8.0-1009.9 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1063.69~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1133.140 | UNKNOWN |
git.kernel.org/linus/9636951e4468f02c72cc75a82dc65d003077edbc (6.9-rc1)
git.kernel.org/stable/c/04a2b6eff2ae1c19cb7f41e803bcbfaf94c06455
git.kernel.org/stable/c/1824f942527f784a19e01eac2d9679a21623d010
git.kernel.org/stable/c/31aaf17200c336fe258b70d39c40645ae19d0240
git.kernel.org/stable/c/4049a9f80513a6739c5677736a4c88f96df1b436
git.kernel.org/stable/c/49f067726ab01c87cf57566797a8a719badbbf08
git.kernel.org/stable/c/9636951e4468f02c72cc75a82dc65d003077edbc
git.kernel.org/stable/c/bc845e2e42cae95172c04bf29807c480f51a2a83
git.kernel.org/stable/c/c67698325c68f8768db858f5c87c34823421746d
git.kernel.org/stable/c/f1cf77bb870046a6111a604f7f7fe83d1c8c9610
launchpad.net/bugs/cve/CVE-2023-52644
nvd.nist.gov/vuln/detail/CVE-2023-52644
security-tracker.debian.org/tracker/CVE-2023-52644
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
ubuntu.com/security/notices/USN-6871-1
ubuntu.com/security/notices/USN-6878-1
ubuntu.com/security/notices/USN-6892-1
ubuntu.com/security/notices/USN-6896-1
ubuntu.com/security/notices/USN-6896-2
ubuntu.com/security/notices/USN-6896-3
ubuntu.com/security/notices/USN-6896-4
ubuntu.com/security/notices/USN-6896-5
ubuntu.com/security/notices/USN-6919-1
www.cve.org/CVERecord?id=CVE-2023-52644