Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-54071

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
24/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: rtw88: use work to update rate to avoid RCU warning<br /> <br /> The ieee80211_ops::sta_rc_update must be atomic, because<br /> ieee80211_chan_bw_change() holds rcu_read lock while calling<br /> drv_sta_rc_update(), so create a work to do original things.<br /> <br /> Voluntary context switch within RCU read-side critical section!<br /> WARNING: CPU: 0 PID: 4621 at kernel/rcu/tree_plugin.h:318<br /> rcu_note_context_switch+0x571/0x5d0<br /> CPU: 0 PID: 4621 Comm: kworker/u16:2 Tainted: G W OE<br /> Workqueue: phy3 ieee80211_chswitch_work [mac80211]<br /> RIP: 0010:rcu_note_context_switch+0x571/0x5d0<br /> Call Trace:<br /> <br /> __schedule+0xb0/0x1460<br /> ? __mod_timer+0x116/0x360<br /> schedule+0x5a/0xc0<br /> schedule_timeout+0x87/0x150<br /> ? trace_raw_output_tick_stop+0x60/0x60<br /> wait_for_completion_timeout+0x7b/0x140<br /> usb_start_wait_urb+0x82/0x160 [usbcore<br /> usb_control_msg+0xe3/0x140 [usbcore<br /> rtw_usb_read+0x88/0xe0 [rtw_usb<br /> rtw_usb_read8+0xf/0x10 [rtw_usb<br /> rtw_fw_send_h2c_command+0xa0/0x170 [rtw_core<br /> rtw_fw_send_ra_info+0xc9/0xf0 [rtw_core<br /> drv_sta_rc_update+0x7c/0x160 [mac80211<br /> ieee80211_chan_bw_change+0xfb/0x110 [mac80211<br /> ieee80211_change_chanctx+0x38/0x130 [mac80211<br /> ieee80211_vif_use_reserved_switch+0x34e/0x900 [mac80211<br /> ieee80211_link_use_reserved_context+0x88/0xe0 [mac80211<br /> ieee80211_chswitch_work+0x95/0x170 [mac80211<br /> process_one_work+0x201/0x410<br /> worker_thread+0x4a/0x3b0<br /> ? process_one_work+0x410/0x410<br /> kthread+0xe1/0x110<br /> ? kthread_complete_and_exit+0x20/0x20<br /> ret_from_fork+0x1f/0x30<br />

Impacto