DEBIAN-CVE-2023-54071

Source
https://security-tracker.debian.org/tracker/CVE-2023-54071
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54071.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-54071
Upstream
Published
2025-12-24T13:16:08.950Z
Modified
2025-12-25T11:14:33.205736Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: use work to update rate to avoid RCU warning The ieee80211ops::starcupdate must be atomic, because ieee80211chanbwchange() holds rcuread lock while calling drvstarcupdate(), so create a work to do original things. Voluntary context switch within RCU read-side critical section! WARNING: CPU: 0 PID: 4621 at kernel/rcu/treeplugin.h:318 rcunotecontextswitch+0x571/0x5d0 CPU: 0 PID: 4621 Comm: kworker/u16:2 Tainted: G W OE Workqueue: phy3 ieee80211chswitchwork [mac80211] RIP: 0010:rcunotecontextswitch+0x571/0x5d0 Call Trace: <TASK> _schedule+0xb0/0x1460 ? _modtimer+0x116/0x360 schedule+0x5a/0xc0 scheduletimeout+0x87/0x150 ? tracerawoutputtickstop+0x60/0x60 waitforcompletiontimeout+0x7b/0x140 usbstartwaiturb+0x82/0x160 [usbcore usbcontrolmsg+0xe3/0x140 [usbcore rtwusbread+0x88/0xe0 [rtwusb rtwusbread8+0xf/0x10 [rtwusb rtwfwsendh2ccommand+0xa0/0x170 [rtwcore rtwfwsendrainfo+0xc9/0xf0 [rtwcore drvstarcupdate+0x7c/0x160 [mac80211 ieee80211chanbwchange+0xfb/0x110 [mac80211 ieee80211changechanctx+0x38/0x130 [mac80211 ieee80211vifusereservedswitch+0x34e/0x900 [mac80211 ieee80211linkusereservedcontext+0x88/0xe0 [mac80211 ieee80211chswitchwork+0x95/0x170 [mac80211 processonework+0x201/0x410 workerthread+0x4a/0x3b0 ? processonework+0x410/0x410 kthread+0xe1/0x110 ? kthreadcompleteandexit+0x20/0x20 retfrom_fork+0x1f/0x30 </TASK>

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.37-1

Affected versions

6.*
6.1.27-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54071.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54071.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54071.json"