CVE-2023-53639Race Condition within a Thread in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to dev_dbg() in callback The warn is triggered on a known race condition, documented in the code above the test, that is correctly handled. Using WARN() hinders automated testing. Reducing severity.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel3.94.14.315+7
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxde2070fc4aa7c0205348010f500f5abce012e67bf2a429e6da37e32438a9adc250cc176a889c16a4+9
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-c64q-8p7x-8r8g: In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to dev_dbg() in callback The warn is triggered on a kn2025-10-07
OSV
CVE-2023-53639: In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to dev_dbg() in callback The warn is triggered on a know2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath6kl: reduce WARN to dev_dbg() in callback2025-10-07
Debian
CVE-2023-53639: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath6k...2023