CVE-2023-52530

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential key use-after-free When ieee80211_key_link() is called by ieee80211_gtk_rekey_add() but returns 0 due to KRACK protection (identical key reinstall), ieee80211_gtk_rekey_add() will still return a pointer into the key, in a potential use-after-free. This normally doesn't happen since it's only called by iwlwifi in case of WoWLAN rekey offload which has its own KRACK protection, but still better to fix, do that by returning an error code and converting that to success on the cfg80211 boundary only, leaving the error for bad callers of ieee80211_gtk_rekey_add().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*

History

11 Dec 2024, 16:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2408f491ff998d674707725eadc47d8930aced09 - () https://git.kernel.org/stable/c/2408f491ff998d674707725eadc47d8930aced09 - Patch
References () https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36 - () https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36 - Patch
References () https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b - () https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b - Patch
References () https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d - () https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d - Patch
References () https://git.kernel.org/stable/c/e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0 - () https://git.kernel.org/stable/c/e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0 - Patch
References () https://git.kernel.org/stable/c/e8e599a635066c50ac214c3e10858f1d37e03022 - () https://git.kernel.org/stable/c/e8e599a635066c50ac214c3e10858f1d37e03022 - Patch
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux

21 Nov 2024, 08:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36 - () https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36 -
References () https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b - () https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b -
References () https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d - () https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d -

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/2408f491ff998d674707725eadc47d8930aced09 -

22 Oct 2024, 15:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: soluciona el posible Use After Free de la clave Cuando ieee80211_key_link() es llamado por ieee80211_gtk_rekey_add() pero devuelve 0 debido a la protección KRACK (reinstalación de clave idéntica), ieee80211_gtk_rekey_add() aún devolverá un puntero a la clave, en un posible Use After Free. Esto normalmente no sucede ya que iwlwifi solo lo llama en caso de descarga de recodificación de WoWLAN, que tiene su propia protección KRACK, pero aún es mejor solucionarlo, hágalo devolviendo un código de error y convirtiéndolo en exitoso solo en el límite cfg80211, dejando el error para personas que llaman mal de ieee80211_gtk_rekey_add().
References
  • () https://git.kernel.org/stable/c/e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0 -
  • () https://git.kernel.org/stable/c/e8e599a635066c50ac214c3e10858f1d37e03022 -

02 Mar 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-02 22:15

Updated : 2024-12-11 16:26


NVD link : CVE-2023-52530

Mitre link : CVE-2023-52530

CVE.ORG link : CVE-2023-52530


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free