CVE-2023-54288Linux vulnerability

7 documents6 sources
Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fortify the spinlock against deadlock by interrupt In the function ieee80211_tx_dequeue() there is a particular locking sequence: begin: spin_lock(&local->queue_stop_reason_lock); q_stopped = local->queue_stop_reasons[q]; spin_unlock(&local->queue_stop_reason_lock); However small the chance (increased by ftracetest), an asynchronous interrupt can occur in between of spin_lock() and spin_unlock(), and the inte

Affected Packages4 packages

Linuxlinux/linux_kernel6.2.06.3.4+1
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linux7b8fe53d2a1da48db02ae961b29b8ee2f5515861c79d794a2cd76eca47b2491c5030be9a6418c5d6+3
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54288: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fortify the spinlock against deadlock by interrupt In the function2025-12-30
OSV
wifi: mac80211: fortify the spinlock against deadlock by interrupt2025-12-30
GHSA
GHSA-3v5g-mc4j-7vr8: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fortify the spinlock against deadlock by interrupt In the functi2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: wifi: mac80211: fortify the spinlock against deadlock by interrupt2025-12-30
Debian
CVE-2023-54288: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54288 Impact, Exploitability, and Mitigation Steps | Wiz