AI Score
Confidence
Low
EPSS
Percentile
15.5%
SSVC
Exploitation
none
Automatable
no
Technical Impact
partial
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix gtk offload status event locking
The ath11k active pdevs are protected by RCU but the gtk offload status
event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not
marked as a read-side critical section.
Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.
Compile tested only.
[
{
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"product": "Linux",
"versions": [
{
"status": "affected",
"version": "a16d9b50cfba",
"lessThan": "0cf7577b6b31",
"versionType": "git"
},
{
"status": "affected",
"version": "a16d9b50cfba",
"lessThan": "cf9c7d783a2b",
"versionType": "git"
},
{
"status": "affected",
"version": "a16d9b50cfba",
"lessThan": "e83246ecd3b1",
"versionType": "git"
},
{
"status": "affected",
"version": "a16d9b50cfba",
"lessThan": "1dea3c0720a1",
"versionType": "git"
}
],
"programFiles": [
"drivers/net/wireless/ath/ath11k/wmi.c"
],
"defaultStatus": "unaffected"
},
{
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"product": "Linux",
"versions": [
{
"status": "affected",
"version": "5.19"
},
{
"status": "unaffected",
"version": "0",
"lessThan": "5.19",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "6.1.64",
"versionType": "custom",
"lessThanOrEqual": "6.1.*"
},
{
"status": "unaffected",
"version": "6.5.13",
"versionType": "custom",
"lessThanOrEqual": "6.5.*"
},
{
"status": "unaffected",
"version": "6.6.3",
"versionType": "custom",
"lessThanOrEqual": "6.6.*"
},
{
"status": "unaffected",
"version": "6.7",
"versionType": "original_commit_for_fix",
"lessThanOrEqual": "*"
}
],
"programFiles": [
"drivers/net/wireless/ath/ath11k/wmi.c"
],
"defaultStatus": "affected"
}
]