CVE-2023-52530

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
02/03/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mac80211: fix potential key use-after-free<br /> <br /> When ieee80211_key_link() is called by ieee80211_gtk_rekey_add()<br /> but returns 0 due to KRACK protection (identical key reinstall),<br /> ieee80211_gtk_rekey_add() will still return a pointer into the<br /> key, in a potential use-after-free. This normally doesn&amp;#39;t happen<br /> since it&amp;#39;s only called by iwlwifi in case of WoWLAN rekey offload<br /> which has its own KRACK protection, but still better to fix, do<br /> that by returning an error code and converting that to success on<br /> the cfg80211 boundary only, leaving the error for bad callers of<br /> ieee80211_gtk_rekey_add().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.14 (including) 5.4.285 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.288 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.169 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.57 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.5.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*