CVE-2026-23373
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: rsi: Don't default to -EOPNOTSUPP in rsi_mac80211_config
This triggers a WARN_ON in ieee80211_hw_conf_init and isn't the expected behavior from the driver - other drivers default to 0 too.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's rsi WiFi driver, the rsi_mac80211_config function incorrectly returns -EOPNOTSUPP, triggering a WARN_ON in ieee80211_hw_conf_init.
Vulnerability
Overview
In the Linux kernel's rsi WiFi driver, the rsi_mac80211_config function was found to return the error code -EOPNOTSUPP by default. This behavior is inconsistent with other wireless drivers, which typically return 0 to indicate success. The issue triggers a WARN_ON in the ieee80211_hw_conf_init function, as the kernel expects a successful return from the driver configuration response [1][2].
Root
Cause and Impact
The root cause is a logic error in the driver's configuration callback. Instead of returning 0 to signal that the configuration was handled (or that no action was needed), the driver returns -EOPNOTSUPP, which is interpreted as an operation not supported. This leads to a kernel warning being emitted, which can cause unnecessary log spam and potentially destabilize the system if the warning is treated as a bug [3][4].
Mitigation
The fix, which has been applied to the Linux kernel stable branches, changes the default return value to 0, aligning the driver's behavior with other wireless drivers and preventing the spurious warning. Users are advised to update their kernel to a version containing this patch has been applied to [1][2][3][4].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
10cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.9.1,<6.12.77
- cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
- (no CPE)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.