{"id":"CVE-2023-52832","summary":"wifi: mac80211: don't return unset power in ieee80211_get_tx_power()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't return unset power in ieee80211_get_tx_power()\n\nWe can get a UBSAN warning if ieee80211_get_tx_power() returns the\nINT_MIN value mac80211 internally uses for \"unset power level\".\n\n UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5\n -2147483648 * 100 cannot be represented in type 'int'\n CPU: 0 PID: 20433 Comm: insmod Tainted: G        WC OE\n Call Trace:\n  dump_stack+0x74/0x92\n  ubsan_epilogue+0x9/0x50\n  handle_overflow+0x8d/0xd0\n  __ubsan_handle_mul_overflow+0xe/0x10\n  nl80211_send_iface+0x688/0x6b0 [cfg80211]\n  [...]\n  cfg80211_register_wdev+0x78/0xb0 [cfg80211]\n  cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]\n  [...]\n  ieee80211_if_add+0x60e/0x8f0 [mac80211]\n  ieee80211_register_hw+0xda5/0x1170 [mac80211]\n\nIn this case, simply return an error instead, to indicate\nthat no data is available.","modified":"2026-04-02T09:43:23.361877Z","published":"2024-05-21T15:31:34.247Z","related":["ALSA-2024:5102","SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2360-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52832.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1571120c44dbe5757aee1612c5b6097cdc42710f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846"},{"type":"WEB","url":"https://git.kernel.org/stable/c/298e767362cade639b7121ecb3cc5345b6529f62"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/efeae5f4972f75d50002bc50eb112ab9e7069b18"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52832.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52832"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"db6d9e9e8b48b7ab68c61553eb5fa68534dd0fde"},{"fixed":"717de20abdcd1d4993fa450e28b8086a352620ea"},{"fixed":"21a0f310a9f3bfd2b4cf4f382430e638607db846"},{"fixed":"2be24c47ac19bf639c48c082486c08888bd603c6"},{"fixed":"adc2474d823fe81d8da759207f4f1d3691aa775a"},{"fixed":"5a94cffe90e20e8fade0b9abd4370bd671fe87c7"},{"fixed":"e160ab85166e77347d0cbe5149045cb25e83937f"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52832.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}