CVE-2023-54071 — Improper Locking in Linux
Severity
4.7MEDIUM
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw88: use work to update rate to avoid RCU warning
The ieee80211_ops::sta_rc_update must be atomic, because
ieee80211_chan_bw_change() holds rcu_read lock while calling
drv_sta_rc_update(), so create a work to do original things.
Voluntary context switch within RCU read-side critical section!
WARNING: CPU: 0 PID: 4621 at kernel/rcu/tree_plugin.h:318
rcu_note_context_switch+0x571/0x5d0
CPU: 0 PID: 4621 Comm: kworker/u16…
Affected Packages4 packages
▶CVEListV5linux/linuxc1edc86472fc3a5aa3b5c5c53c4e20f6a24992a6 — 107677a8f43521e33e4a653e50fdf55ba622a4ce+3
🔴Vulnerability Details
3GHSA▶
GHSA-66p3-rgg9-52hr: In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw88: use work to update rate to avoid RCU warning
The ieee80211_ops::sta↗2025-12-24
OSV▶
CVE-2023-54071: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: use work to update rate to avoid RCU warning The ieee80211_ops::sta_r↗2025-12-24