CVE-2023-54229

Source
https://cve.org/CVERecord?id=CVE-2023-54229
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54229.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54229
Downstream
Related
Published
2025-12-30T12:11:21.549Z
Modified
2026-03-12T03:28:50.352918Z
Summary
wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range

Because of what seems to be a typo, a 6Ghz-only phy for which the BDF does not allow the 7115Mhz channel will fail to register:

WARNING: CPU: 2 PID: 106 at net/wireless/core.c:907 wiphyregister+0x914/0x954 Modules linked in: ath11kpci sbsagwdt CPU: 2 PID: 106 Comm: kworker/u8:5 Not tainted 6.3.0-rc7-next-20230418-00549-g1e096a17625a-dirty #9 Hardware name: Freebox V7R Board (DT) Workqueue: ath11kqmidriverevent ath11kqmidrivereventwork pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : wiphyregister+0x914/0x954 lr : ieee80211registerhw+0x67c/0xc10 sp : ffffff800b123aa0 x29: ffffff800b123aa0 x28: 0000000000000000 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000006 x24: ffffffc008d51418 x23: ffffffc008cb0838 x22: ffffff80176c2460 x21: 0000000000000168 x20: ffffff80176c0000 x19: ffffff80176c03e0 x18: 0000000000000014 x17: 00000000cbef338c x16: 00000000d2a26f21 x15: 00000000ad6bb85f x14: 0000000000000020 x13: 0000000000000020 x12: 00000000ffffffbd x11: 0000000000000208 x10: 00000000fffffdf7 x9 : ffffffc009394718 x8 : ffffff80176c0528 x7 : 000000007fffffff x6 : 0000000000000006 x5 : 0000000000000005 x4 : ffffff800b304284 x3 : ffffff800b304284 x2 : ffffff800b304d98 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: wiphyregister+0x914/0x954 ieee80211registerhw+0x67c/0xc10 ath11kmacregister+0x7c4/0xe10 ath11kcoreqmifirmwareready+0x1f4/0x570 ath11kqmidrivereventwork+0x198/0x590 processonework+0x1b8/0x328 workerthread+0x6c/0x414 kthread+0x100/0x104 retfromfork+0x10/0x20 ---[ end trace 0000000000000000 ]--- ath11kpci 0002:01:00.0: ieee80211 registration failed: -22 ath11kpci 0002:01:00.0: failed register the radio with mac80211: -22 ath11kpci 0002:01:00.0: failed to create pdev core: -22

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54229.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
22eeadcdeab63e88983401f699f61a0121c03a0d
Fixed
532f8bac60419eb28158770470b9bb655de207c8
Fixed
f97832620d7f320bea81707f34631371e87a419b
Fixed
8d1342108c2bf11aaaf293becfc010ecdb6170d9
Fixed
32ca096e712a78b2f0d2e48d33dc0caaba9f9866
Fixed
e2ceb1de2f83aafd8003f0b72dfd4b7441e97d14

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54229.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.10.188
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.150
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.42
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54229.json"