CVE-2023-54025Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled In case WoWlan was never configured during the operation of the system, the hw->wiphy->wowlan_config will be NULL. rsi_config_wowlan() checks whether wowlan_config is non-NULL and if it is not, then WARNs about it. The warning is valid, as during normal operation the rsi_config_wowlan() should only ever be called with non-NULL wowlan_config. In shutdown this rs

Affected Packages4 packages

Linuxlinux/linux_kernel5.7.05.10.188+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux16bbc3eb83728c03138191a5d23d84d38175fa26b2aeb97fd470206e67f7b3b4a3e68212a13f747b+6
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54025: In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled In case WoWlan2025-12-24
OSV
wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled2025-12-24
GHSA
GHSA-jhx4-vm77-c4v2: In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled In case WoWla2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled2025-12-24
Debian
CVE-2023-54025: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54025 Impact, Exploitability, and Mitigation Steps | Wiz