CVE-2023-54071

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-54071
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54071.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54071
Downstream
Published
2025-12-24T12:23:14.874Z
Modified
2025-12-29T10:18:12.573402Z
Summary
wifi: rtw88: use work to update rate to avoid RCU warning
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: use work to update rate to avoid RCU warning

The ieee80211ops::starcupdate must be atomic, because ieee80211chanbwchange() holds rcuread lock while calling drvstarcupdate(), so create a work to do original things.

Voluntary context switch within RCU read-side critical section! WARNING: CPU: 0 PID: 4621 at kernel/rcu/treeplugin.h:318 rcunotecontextswitch+0x571/0x5d0 CPU: 0 PID: 4621 Comm: kworker/u16:2 Tainted: G W OE Workqueue: phy3 ieee80211chswitchwork [mac80211] RIP: 0010:rcunotecontextswitch+0x571/0x5d0 Call Trace: <TASK> _schedule+0xb0/0x1460 ? _modtimer+0x116/0x360 schedule+0x5a/0xc0 scheduletimeout+0x87/0x150 ? tracerawoutputtickstop+0x60/0x60 waitforcompletiontimeout+0x7b/0x140 usbstartwaiturb+0x82/0x160 [usbcore usbcontrolmsg+0xe3/0x140 [usbcore rtwusbread+0x88/0xe0 [rtwusb rtwusbread8+0xf/0x10 [rtwusb rtwfwsendh2ccommand+0xa0/0x170 [rtwcore rtwfwsendrainfo+0xc9/0xf0 [rtwcore drvstarcupdate+0x7c/0x160 [mac80211 ieee80211chanbwchange+0xfb/0x110 [mac80211 ieee80211changechanctx+0x38/0x130 [mac80211 ieee80211vifusereservedswitch+0x34e/0x900 [mac80211 ieee80211linkusereservedcontext+0x88/0xe0 [mac80211 ieee80211chswitchwork+0x95/0x170 [mac80211 processonework+0x201/0x410 workerthread+0x4a/0x3b0 ? processonework+0x410/0x410 kthread+0xe1/0x110 ? kthreadcompleteandexit+0x20/0x20 retfrom_fork+0x1f/0x30 </TASK>

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54071.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c1edc86472fc3a5aa3b5c5c53c4e20f6a24992a6
Fixed
107677a8f43521e33e4a653e50fdf55ba622a4ce
Fixed
dd3af22323e79a2ffabed366db20aab83716fe6f
Fixed
bcafcb959a57a6890e900199690c5fc47da1a304

Affected versions

v5.*

v5.18
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.3.1
v6.3.2
v6.3.3
v6.4-rc1

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54071.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
6.1.30
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.3.4

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54071.json"