CVE-2023-54071Improper Locking in Linux

CWE-667Improper Locking7 documents6 sources
Severity
4.7MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: use work to update rate to avoid RCU warning The ieee80211_ops::sta_rc_update must be atomic, because ieee80211_chan_bw_change() holds rcu_read lock while calling drv_sta_rc_update(), so create a work to do original things. Voluntary context switch within RCU read-side critical section! WARNING: CPU: 0 PID: 4621 at kernel/rcu/tree_plugin.h:318 rcu_note_context_switch+0x571/0x5d0 CPU: 0 PID: 4621 Comm: kworker/u16

Affected Packages4 packages

Linuxlinux/linux_kernel5.19.06.1.30+1
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linuxc1edc86472fc3a5aa3b5c5c53c4e20f6a24992a6107677a8f43521e33e4a653e50fdf55ba622a4ce+3
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
wifi: rtw88: use work to update rate to avoid RCU warning2025-12-24
GHSA
GHSA-66p3-rgg9-52hr: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: use work to update rate to avoid RCU warning The ieee80211_ops::sta2025-12-24
OSV
CVE-2023-54071: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: use work to update rate to avoid RCU warning The ieee80211_ops::sta_r2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: wifi: rtw88: use work to update rate to avoid RCU warning2025-12-24
Debian
CVE-2023-54071: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54071 Impact, Exploitability, and Mitigation Steps | Wiz