CVE-2023-52530
UNKNOWN
Published 2024-03-02T21:52:34.966Z
Actions:
No CVSS data available
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fix potential key use-after-free
When ieee80211_key_link() is called by ieee80211_gtk_rekey_add()
but returns 0 due to KRACK protection (identical key reinstall),
ieee80211_gtk_rekey_add() will still return a pointer into the
key, in a potential use-after-free. This normally doesn't happen
since it's only called by iwlwifi in case of WoWLAN rekey offload
which has its own KRACK protection, but still better to fix, do
that by returning an error code and converting that to success on
the cfg80211 boundary only, leaving the error for bad callers of
ieee80211_gtk_rekey_add().
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
ef810e7c3d2a8fb3bbd23726599c487c30ea747e
a0a8a11d1630cd648dc1ce86da620b4e240e0315
6891c6fd2a500d1f39d1426765f610bdc2c2a39d
003aa22c9619b49efe950aca3aebd1235a04940d
6440f0ee8a1779f53526bccb9de00914daeb9094
2586fa0007dc6b7745da14250be7e3aae706b128
a9ab1b2e30e898440a22d7b1d7a5b0b7c6a8791f
References
Published: 2024-03-02T21:52:34.966Z
Last Modified: 2025-05-04T12:49:12.815Z
Copied to clipboard!