CVE-2023-53554
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
04/10/2025
Last modified:
12/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()<br />
<br />
The "exc->key_len" is a u16 that comes from the user. If it&#39;s over<br />
IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12 (including) | 4.14.322 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.291 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.124 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.43 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.4.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/5373a1aa91b2298f9305794b8270cf9896be96b6
- https://git.kernel.org/stable/c/5f1c7031e044cb2fba82836d55cc235e2ad619dc
- https://git.kernel.org/stable/c/663fff29fd613e2b0d30c4138157312ba93c4939
- https://git.kernel.org/stable/c/7ae9f55a495077f838bab466411ee6f38574df9b
- https://git.kernel.org/stable/c/9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6
- https://git.kernel.org/stable/c/b1b04b56745bc79286c80aa876fabfab1e08ebf1
- https://git.kernel.org/stable/c/baf420e30364ef9efe3e29a5c0e01e612aebf3fe
- https://git.kernel.org/stable/c/caac4b6c15b66feae4d83f602e1e46f124540202



