"value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ath11k: liberar un peer para la estaci\u00f3n cuando se desconecta del AP para QCA6390/WCN6855. el commit b4a0f54156ac (\"ath11k: mover la eliminaci\u00f3n del peer despu\u00e9s de la detenci\u00f3n del vdev de la estaci\u00f3n para QCA6390 y WCN6855\") es para reparar un fallo del firmware modificando la secuencia de comandos WMI, pero en realidad omite toda la operaci\u00f3n de eliminaci\u00f3n del peer, por lo que el commit 58595c9874c6 (\"ath11k: solucionar el problema del puntero colgante tras un fallo en la eliminaci\u00f3n del peer\")notieneefectoy,acontinuaci\u00f3n,apareceunaadvertenciadeusotrasliberaci\u00f3ndeKASAN,porquepeer->stanoest\u00e1configuradoenNULLyseutilizam\u00e1starde.SecambiaparaomitirsoloWMI_PEER_DELETE_CMDIDparaQCA6390/WCN6855.registrodeusuariodespu\u00e9sdeliberaci\u00f3n:[534.888665]ERROR:KASAN:use-after-freeenath11k_dp_rx_update_peer_stats+0x912/0xc10[ath11k][534.888696]Lecturadetama\u00f1o8enladirecci\u00f3nffff8881396bb1b8porlatareartcwake/2860[534.888705]CPU:4PID:2860Comm:rtcwakeKdump:cargadoTainted:GW5.15.0-wt-ath+#523[534.888712]Nombredelhardware:Intel(R)ClientSystemsNUC8i7HVK/NUC8i7HVB,BIOSHNKBLi70.86A.0067.2021.0528.133928/05/2021[534.888716]Seguimientodellamadas:[534.888720][534.888726]dump_stack_lvl+0x57/0x7d[534.888736]print_address_description.constprop.0+0x1f/0x170[534.888745]?ath11k_dp_rx_update_peer_stats+0x912/0xc10[ath11k][534.888771]kasan_report.cold+0x83/0xdf[534.888783]?ath11k_dp_rx_update_peer_stats+0x912/0xc10[ath11k][534.888810]ath11k_dp_rx_update_peer_stats+0x912/0xc10[ath11k][534.888840]ath11k_dp_rx_process_mon_status+0x529/0xa70[ath11k][534.888874]?ath11k_dp_rx_mon_status_bufs_replenish+0x3f0/0x3f0[ath11k][534.888897]?check_prev_add+0x20f0/0x20f0[534.888922]?__lock_acquire+0xb72/0x1870[534.888937]?find_held_lock+0x33/0x110[534.888954]ath11k_dp_rx_process_mon_rings+0x297/0x520[ath11k][534.888981]?rcu_read_unlock+0x40/0x40[534.888990]?ath11k_dp_rx_pdev_alloc+0xd90/0xd90[ath11k][534.889026]ath11k_dp_service_mon_ring+0x67/0xe0[ath11k][534.889053]?ath11k_dp_rx_process_mon_rings+0x520/0x520[ath11k][534.889075]call_timer_fn+0x167/0x4a0[534.889084]?add_timer_on+0x3b0/0x3b0[534.889103]?lockdep_hardirqs_on_prepare.part.0+0x18c/0x370[534.889117]__run_timers.part.0+0x539/0x8b0[534.889123]?ath11k_dp_rx_process_mon_rings+0x520/0x520[ath11k][534.889157]?call_timer_fn+0x4a0/0x4a0[534.889164]?mark_lock_irq+0x1c30/0x1c30[534.889173]?clockevents_program_event+0xdd/0x280[534.889189]?mark_held_locks+0xa5/0xe0[534.889203]run_timer_softirq+0x97/0x180[534.889213]__do_softirq+0x276/0x86a[534.889230]__irq_exit_rcu+0x11c/0x180[534.889238]irq_exit_rcu+0x5/0x20[534.889244]sysvec_apic_timer_interrupt+0x8e/0xc0[534.889251][534.889254][534.889259]asm_sysvec_apic_timer_interrupt+0x12/0x20[534.889265]RIP:0010:_raw_spin_unlock_irqrestore+0x38/0x70[534.889271]C\u00f3digo:742410e8eac2bffd4889efe81253c0fd81e30002000075259c58f6c402752d4885db7401fbbf0100000013a7b5fd658b05ccd99c5e85c0740a5b5dc3e8a0ee[534.889276]RSP:0018:ffffc90002e5f880EFLAGS:00000206[534.889284]RAX:00000000000000006RBX:00000000000000200RCX:ffffffff9f256f10[534.889289]RDX:00000000000000000RSI:fffffffa1c6e420RDI:00000000000000001[534.889293]RBP:ffff8881095e6200R08:00000000000000001R09:ffffffffa40d2b8f[534.889298]R10:fffffbfff481a571R11:0000000000000001R12:ffff8881095e6e68[534.889302]R13:ffffc90002e5f908R14:0000000000000246R15:0000000000000000[534.889316]?mark_lock+0xd0/0x14a0[534.889332]klist_next+0x1d4/0x450[534.889340]?dpm_wait_for_subordinate+0x2d0/0x2d0[534.889350]device_for_each_child+0xa8/0x140[534.889360]?device_remove_class_symlinks+0x1b0/0x1b0[534.889370]?__lock_release+0x4bd/0x9f0[534.88937