{
  "threat_severity" : "Moderate",
  "public_date" : "2025-12-30T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: wifi: fix registration of 6Ghz-only phy without the full channel range",
    "id" : "2426256",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2426256"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-823",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nwifi: ath11k: fix registration of 6Ghz-only phy without the full channel range\nBecause of what seems to be a typo, a 6Ghz-only phy for which the BDF\ndoes not allow the 7115Mhz channel will fail to register:\nWARNING: CPU: 2 PID: 106 at net/wireless/core.c:907 wiphy_register+0x914/0x954\nModules linked in: ath11k_pci sbsa_gwdt\nCPU: 2 PID: 106 Comm: kworker/u8:5 Not tainted 6.3.0-rc7-next-20230418-00549-g1e096a17625a-dirty #9\nHardware name: Freebox V7R Board (DT)\nWorkqueue: ath11k_qmi_driver_event ath11k_qmi_driver_event_work\npstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : wiphy_register+0x914/0x954\nlr : ieee80211_register_hw+0x67c/0xc10\nsp : ffffff800b123aa0\nx29: ffffff800b123aa0 x28: 0000000000000000 x27: 0000000000000000\nx26: 0000000000000000 x25: 0000000000000006 x24: ffffffc008d51418\nx23: ffffffc008cb0838 x22: ffffff80176c2460 x21: 0000000000000168\nx20: ffffff80176c0000 x19: ffffff80176c03e0 x18: 0000000000000014\nx17: 00000000cbef338c x16: 00000000d2a26f21 x15: 00000000ad6bb85f\nx14: 0000000000000020 x13: 0000000000000020 x12: 00000000ffffffbd\nx11: 0000000000000208 x10: 00000000fffffdf7 x9 : ffffffc009394718\nx8 : ffffff80176c0528 x7 : 000000007fffffff x6 : 0000000000000006\nx5 : 0000000000000005 x4 : ffffff800b304284 x3 : ffffff800b304284\nx2 : ffffff800b304d98 x1 : 0000000000000000 x0 : 0000000000000000\nCall trace:\nwiphy_register+0x914/0x954\nieee80211_register_hw+0x67c/0xc10\nath11k_mac_register+0x7c4/0xe10\nath11k_core_qmi_firmware_ready+0x1f4/0x570\nath11k_qmi_driver_event_work+0x198/0x590\nprocess_one_work+0x1b8/0x328\nworker_thread+0x6c/0x414\nkthread+0x100/0x104\nret_from_fork+0x10/0x20\n---[ end trace 0000000000000000 ]---\nath11k_pci 0002:01:00.0: ieee80211 registration failed: -22\nath11k_pci 0002:01:00.0: failed register the radio with mac80211: -22\nath11k_pci 0002:01:00.0: failed to create pdev core: -22", "A flaw was found in the Linux kernel ath11k Wi-Fi driver’s channel range validation logic. When registering a 6 GHz-only physical device whose board data does not allow a specific 7.115 GHz channel, the driver incorrectly handles the channel range, causing the phy to fail registration. This condition generates warnings in the kernel log and results in the wireless interface failing to initialize for affected hardware configurations." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2394",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-427.13.1.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2394",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-427.13.1.el9_4"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-54229\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-54229\nhttps://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54229-80e7@gregkh/T" ],
  "name" : "CVE-2023-54229",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}