-

CVE-2023-54025

In the Linux kernel, the following vulnerability has been resolved:

wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled

In case WoWlan was never configured during the operation of the system,
the hw->wiphy->wowlan_config will be NULL. rsi_config_wowlan() checks
whether wowlan_config is non-NULL and if it is not, then WARNs about it.
The warning is valid, as during normal operation the rsi_config_wowlan()
should only ever be called with non-NULL wowlan_config. In shutdown this
rsi_config_wowlan() should only ever be called if WoWlan was configured
before by the user.

Add checks for non-NULL wowlan_config into the shutdown hook. While at it,
check whether the wiphy is also non-NULL before accessing wowlan_config .
Drop the single-use wowlan_config variable, just inline it into function
call.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < b2aeb97fd470206e67f7b3b4a3e68212a13f747b
Version 16bbc3eb83728c03138191a5d23d84d38175fa26
Status affected
Version < 4391fa180856ff84a2cef4a92694a689eebb855e
Version 16bbc3eb83728c03138191a5d23d84d38175fa26
Status affected
Version < eb205a06908122f50b1dd1baa43f7c8036bfc7dc
Version 16bbc3eb83728c03138191a5d23d84d38175fa26
Status affected
Version < 1b51236aa49a0564280bd45c94118cab6d9b0fbd
Version 16bbc3eb83728c03138191a5d23d84d38175fa26
Status affected
Version < b601468539c1d97539097bfc87ad11f1704b7eb7
Version 16bbc3eb83728c03138191a5d23d84d38175fa26
Status affected
Version < b241e260820b68c09586e8a0ae0fc23c0e3215bd
Version 16bbc3eb83728c03138191a5d23d84d38175fa26
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.7
Status affected
Version < 5.7
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.3.*
Version 6.3.13
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.