-
CVE-2023-54025
- EPSS 0.04%
- Veröffentlicht 24.12.2025 10:55:54
- Zuletzt bearbeitet 29.12.2025 15:58:56
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled In case WoWlan was never configured during the operation of the system, the hw->wiphy->wowlan_config will be NULL. rsi_config_wowlan() checks whether wowlan_config is non-NULL and if it is not, then WARNs about it. The warning is valid, as during normal operation the rsi_config_wowlan() should only ever be called with non-NULL wowlan_config. In shutdown this rsi_config_wowlan() should only ever be called if WoWlan was configured before by the user. Add checks for non-NULL wowlan_config into the shutdown hook. While at it, check whether the wiphy is also non-NULL before accessing wowlan_config . Drop the single-use wowlan_config variable, just inline it into function call.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
b2aeb97fd470206e67f7b3b4a3e68212a13f747b
Version
16bbc3eb83728c03138191a5d23d84d38175fa26
Status
affected
Version <
4391fa180856ff84a2cef4a92694a689eebb855e
Version
16bbc3eb83728c03138191a5d23d84d38175fa26
Status
affected
Version <
eb205a06908122f50b1dd1baa43f7c8036bfc7dc
Version
16bbc3eb83728c03138191a5d23d84d38175fa26
Status
affected
Version <
1b51236aa49a0564280bd45c94118cab6d9b0fbd
Version
16bbc3eb83728c03138191a5d23d84d38175fa26
Status
affected
Version <
b601468539c1d97539097bfc87ad11f1704b7eb7
Version
16bbc3eb83728c03138191a5d23d84d38175fa26
Status
affected
Version <
b241e260820b68c09586e8a0ae0fc23c0e3215bd
Version
16bbc3eb83728c03138191a5d23d84d38175fa26
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.7
Status
affected
Version <
5.7
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.188
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.3.*
Version
6.3.13
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|