CVE-2023-52644 — Linux vulnerability
55 documents7 sources
Severity
6.3MEDIUMNVD
OSV7.0OSV6.5OSV5.5
EPSS
0.0%
top 99.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 17
Latest updateAug 28
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled
When QoS is disabled, the queue priority value will not map to the correct
ieee80211 queue since there is only one queue. Stop/wake queue 0 when QoS
is disabled to prevent trying to stop/wake a non-existent queue and failing
to stop/wake the actual queue instantiated.
Log of issue before change (with kernel parameter qos=0):
[ +5.112651] ------------[ cut …
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.0 | Impact: 5.2
Affected Packages5 packages
▶CVEListV5linux/linuxe6f5b934fba8c44c87c551e066aa7ca6fde2939e — 1824f942527f784a19e01eac2d9679a21623d010+9
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
27📋Vendor Advisories
26💬Community
1Bugzilla▶
CVE-2023-52644 kernel: wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled↗2024-04-17