CVE-2023-54025
BaseFortify
Publication date: 2025-12-24
Last updated on: 2025-12-29
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's wifi driver for RSI devices. Specifically, it concerns the handling of Wake-on-WLAN (WoWlan) configuration during system shutdown. If WoWlan was never enabled during system operation, the wowlan_config pointer is NULL. However, the function rsi_config_wowlan() was being called during shutdown without checking if wowlan_config was non-NULL, causing warnings and potential improper behavior. The fix adds checks to ensure rsi_config_wowlan() is only called if WoWlan was previously configured, preventing access to NULL pointers during shutdown.
How can this vulnerability impact me? :
If unpatched, this vulnerability could cause warnings or errors during system shutdown related to accessing a NULL wowlan_config pointer. While the description does not specify direct security impacts such as privilege escalation or denial of service, improper handling of NULL pointers can lead to system instability or crashes during shutdown.