CVE-2023-54071
RCU Context-Switch Vulnerability in Linux rtw88 Wi-Fi Driver
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's wifi driver (rtw88) involves improper handling of rate updates within the ieee80211_ops::sta_rc_update function. The function must be atomic because ieee80211_chan_bw_change() holds an RCU read lock while calling drv_sta_rc_update(). The issue arises from a voluntary context switch occurring within an RCU read-side critical section, which can cause warnings and potential instability. The fix involves creating a work item to perform the original operations outside the RCU read lock to avoid these issues.
How can this vulnerability impact me? :
This vulnerability can lead to warnings and potential instability in the Linux kernel's wifi subsystem due to improper synchronization during rate updates. It may cause unexpected behavior or crashes related to wireless communication, impacting system reliability and network connectivity.