Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-53639— wifi: ath6kl: reduce WARN to dev_dbg() in callback

EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-53639

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
wifi: ath6kl: reduce WARN to dev_dbg() in callback
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to dev_dbg() in callback The warn is triggered on a known race condition, documented in the code above the test, that is correctly handled. Using WARN() hinders automated testing. Reducing severity.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于竞争条件处理不当,可能导致系统稳定性问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux de2070fc4aa7c0205348010f500f5abce012e67b ~ f2a429e6da37e32438a9adc250cc176a889c16a4 -
LinuxLinux 3.9 -

II. Public POCs for CVE-2023-53639

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-53639

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-10-07 · 118 CVEs total

CVE-2022-50544usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()
CVE-2023-53658spi: bcm-qspi: return error if neither hif_mspi nor mspi is available
CVE-2023-53657ice: Don't tx before switchdev is fully configured
CVE-2023-53656drivers/perf: hisi: Don't migrate perf to the CPU going to teardown
CVE-2023-53655rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed
CVE-2022-50555tipc: fix a null-ptr-deref in tipc_topsrv_accept
CVE-2022-50554blk-mq: avoid double ->queue_rq() because of early timeout
CVE-2022-50553tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx'
CVE-2022-50552blk-mq: use quiesced elevator switch when reinitializing queues
CVE-2022-50551wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request()
CVE-2022-50550blk-iolatency: Fix memory leak on add_disk() failures
CVE-2022-50549dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata
CVE-2022-50547media: solo6x10: fix possible memory leak in solo_sysfs_init()
CVE-2022-50548media: i2c: hi846: Fix memory leak in hi846_parse_dt()
CVE-2022-50546ext4: fix uninititialized value in 'ext4_evict_inode'
CVE-2023-53654octeontx2-af: Add validation before accessing cgx and lmac
CVE-2022-50537firmware: raspberrypi: fix possible memory leak in rpi_firmware_probe()
CVE-2022-50536bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data
CVE-2022-50535drm/amd/display: Fix potential null-deref in dm_resume
CVE-2023-53652vdpa: Add features attr to vdpa_nl_policy for nlattr length check

Showing top 20 of 118 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-53639

No comments yet


Leave a comment