CVE-2023-53589
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
21/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: iwlwifi: mvm: don&#39;t trust firmware n_channels<br />
<br />
If the firmware sends us a corrupted MCC response with<br />
n_channels much larger than the command response can be,<br />
we might copy far too much (uninitialized) memory and<br />
even crash if the n_channels is large enough to make it<br />
run out of the one page allocated for the FW response.<br />
<br />
Fix that by checking the lengths. Doing a
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.1 (including) | 5.4.244 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.181 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.30 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.3.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/05ad5a4d421ce65652fcb24d46b7e273130240d6
- https://git.kernel.org/stable/c/557ba100d8cf3661ff8d71c0b4a2cba8db555ec2
- https://git.kernel.org/stable/c/682b6dc29d98e857e6ca4bbc077c7dc2899b7473
- https://git.kernel.org/stable/c/c176f03350954b795322de0bfe1d7b514db41f45
- https://git.kernel.org/stable/c/d0d39bed9e95f27a246be91c5929254ac043ed30
- https://git.kernel.org/stable/c/e519a404a5bbba37693cb10fa61794a5fce4fd9b



