CVE-2023-54025

Published: Dic 24, 2025 Last Modified: Dic 29, 2025
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled

In case WoWlan was never configured during the operation of the system,
the hw->wiphy->wowlan_config will be NULL. rsi_config_wowlan() checks
whether wowlan_config is non-NULL and if it is not, then WARNs about it.
The warning is valid, as during normal operation the rsi_config_wowlan()
should only ever be called with non-NULL wowlan_config. In shutdown this
rsi_config_wowlan() should only ever be called if WoWlan was configured
before by the user.

Add checks for non-NULL wowlan_config into the shutdown hook. While at it,
check whether the wiphy is also non-NULL before accessing wowlan_config .
Drop the single-use wowlan_config variable, just inline it into function
call.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0003
Percentile
0,1th
Updated

EPSS Score Trend (Last 83 Days)

https://git.kernel.org/stable/c/1b51236aa49a0564280bd45c94118cab6d9b0fbd
https://git.kernel.org/stable/c/4391fa180856ff84a2cef4a92694a689eebb855e
https://git.kernel.org/stable/c/b241e260820b68c09586e8a0ae0fc23c0e3215bd
https://git.kernel.org/stable/c/b2aeb97fd470206e67f7b3b4a3e68212a13f747b
https://git.kernel.org/stable/c/b601468539c1d97539097bfc87ad11f1704b7eb7
https://git.kernel.org/stable/c/eb205a06908122f50b1dd1baa43f7c8036bfc7dc