CVE-2023-53764 — Missing Lock Check in Linux
Severity
5.9MEDIUM
No vectorEPSS
0.0%
top 89.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Handle lock during peer_id find
ath12k_peer_find_by_id() requires that the caller hold the
ab->base_lock. Currently the WBM error path does not hold
the lock and calling that function, leads to the
following lockdep_assert()in QCN9274:
[105162.160893] ------------[ cut here ]------------
[105162.160916] WARNING: CPU: 3 PID: 0 at drivers/net/wireless/ath/ath12k/peer.c:71 ath12k_peer_find_by_id+0x52/0x60 [ath12k]
…
Affected Packages4 packages
▶CVEListV5linux/linuxd889913205cf7ebda905b1e62c5867ed4e39f6c2 — 9faf7c696610a348ca94a224d55c946b19b3279d+2
🔴Vulnerability Details
3GHSA▶
GHSA-qjv9-pc7w-9xrj: In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Handle lock during peer_id find
ath12k_peer_find_by_id() requires↗2025-12-08
OSV▶
CVE-2023-53764: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Handle lock during peer_id find ath12k_peer_find_by_id() requires th↗2025-12-08