CVE-2023-52832
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
05/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: mac80211: don&#39;t return unset power in ieee80211_get_tx_power()<br />
<br />
We can get a UBSAN warning if ieee80211_get_tx_power() returns the<br />
INT_MIN value mac80211 internally uses for "unset power level".<br />
<br />
UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5<br />
-2147483648 * 100 cannot be represented in type &#39;int&#39;<br />
CPU: 0 PID: 20433 Comm: insmod Tainted: G WC OE<br />
Call Trace:<br />
dump_stack+0x74/0x92<br />
ubsan_epilogue+0x9/0x50<br />
handle_overflow+0x8d/0xd0<br />
__ubsan_handle_mul_overflow+0xe/0x10<br />
nl80211_send_iface+0x688/0x6b0 [cfg80211]<br />
[...]<br />
cfg80211_register_wdev+0x78/0xb0 [cfg80211]<br />
cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]<br />
[...]<br />
ieee80211_if_add+0x60e/0x8f0 [mac80211]<br />
ieee80211_register_hw+0xda5/0x1170 [mac80211]<br />
<br />
In this case, simply return an error instead, to indicate<br />
that no data is available.
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.331 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.300 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.262 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.202 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.140 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846
- https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6
- https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7
- https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea
- https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a
- https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f
- https://git.kernel.org/stable/c/1571120c44dbe5757aee1612c5b6097cdc42710f
- https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846
- https://git.kernel.org/stable/c/298e767362cade639b7121ecb3cc5345b6529f62
- https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6
- https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7
- https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea
- https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a
- https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f
- https://git.kernel.org/stable/c/efeae5f4972f75d50002bc50eb112ab9e7069b18



