{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-52832","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-21T15:19:24.252Z","datePublished":"2024-05-21T15:31:34.247Z","dateUpdated":"2026-01-05T10:17:43.984Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-01-05T10:17:43.984Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't return unset power in ieee80211_get_tx_power()\n\nWe can get a UBSAN warning if ieee80211_get_tx_power() returns the\nINT_MIN value mac80211 internally uses for \"unset power level\".\n\n UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5\n -2147483648 * 100 cannot be represented in type 'int'\n CPU: 0 PID: 20433 Comm: insmod Tainted: G        WC OE\n Call Trace:\n  dump_stack+0x74/0x92\n  ubsan_epilogue+0x9/0x50\n  handle_overflow+0x8d/0xd0\n  __ubsan_handle_mul_overflow+0xe/0x10\n  nl80211_send_iface+0x688/0x6b0 [cfg80211]\n  [...]\n  cfg80211_register_wdev+0x78/0xb0 [cfg80211]\n  cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]\n  [...]\n  ieee80211_if_add+0x60e/0x8f0 [mac80211]\n  ieee80211_register_hw+0xda5/0x1170 [mac80211]\n\nIn this case, simply return an error instead, to indicate\nthat no data is available."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/mac80211/cfg.c"],"versions":[{"version":"db6d9e9e8b48b7ab68c61553eb5fa68534dd0fde","lessThan":"717de20abdcd1d4993fa450e28b8086a352620ea","status":"affected","versionType":"git"},{"version":"db6d9e9e8b48b7ab68c61553eb5fa68534dd0fde","lessThan":"21a0f310a9f3bfd2b4cf4f382430e638607db846","status":"affected","versionType":"git"},{"version":"db6d9e9e8b48b7ab68c61553eb5fa68534dd0fde","lessThan":"2be24c47ac19bf639c48c082486c08888bd603c6","status":"affected","versionType":"git"},{"version":"db6d9e9e8b48b7ab68c61553eb5fa68534dd0fde","lessThan":"adc2474d823fe81d8da759207f4f1d3691aa775a","status":"affected","versionType":"git"},{"version":"db6d9e9e8b48b7ab68c61553eb5fa68534dd0fde","lessThan":"5a94cffe90e20e8fade0b9abd4370bd671fe87c7","status":"affected","versionType":"git"},{"version":"db6d9e9e8b48b7ab68c61553eb5fa68534dd0fde","lessThan":"e160ab85166e77347d0cbe5149045cb25e83937f","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/mac80211/cfg.c"],"versions":[{"version":"5.7","status":"affected"},{"version":"0","lessThan":"5.7","status":"unaffected","versionType":"semver"},{"version":"5.10.202","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.140","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.64","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.13","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6.3","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"5.10.202"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"5.15.140"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.1.64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.5.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.6.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.7"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea"},{"url":"https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846"},{"url":"https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6"},{"url":"https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a"},{"url":"https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7"},{"url":"https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f"}],"title":"wifi: mac80211: don't return unset power in ieee80211_get_tx_power()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-920","lang":"en","description":"CWE-920 Improper Restriction of Power Consumption"}]}],"affected":[{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1da177e4c3f4","status":"affected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"4.14.331","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"4.19.300","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"5.4.262","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"5.10.202","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"5.15.140","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.1.64","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.5.13","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.6.3","status":"unaffected"}]},{"vendor":"linux","product":"linux_kernel","cpes":["cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.7","status":"unaffected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.1,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-05-21T19:51:54.630981Z","id":"CVE-2023-52832","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-14T16:53:19.622Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:11:36.043Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/1571120c44dbe5757aee1612c5b6097cdc42710f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/298e767362cade639b7121ecb3cc5345b6529f62","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/efeae5f4972f75d50002bc50eb112ab9e7069b18","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f","tags":["x_transferred"]}]}]}}