Home

Description

In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.

PUBLISHED Reserved 2025-10-04 | Published 2025-10-04 | Updated 2025-10-04 | Assigner Linux

Product status

Default status
unaffected

b121d84882b97b8668be0b95e9ba50cfd01aa0f1 before 9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6
affected

b121d84882b97b8668be0b95e9ba50cfd01aa0f1 before 663fff29fd613e2b0d30c4138157312ba93c4939
affected

b121d84882b97b8668be0b95e9ba50cfd01aa0f1 before 5373a1aa91b2298f9305794b8270cf9896be96b6
affected

b121d84882b97b8668be0b95e9ba50cfd01aa0f1 before caac4b6c15b66feae4d83f602e1e46f124540202
affected

b121d84882b97b8668be0b95e9ba50cfd01aa0f1 before baf420e30364ef9efe3e29a5c0e01e612aebf3fe
affected

b121d84882b97b8668be0b95e9ba50cfd01aa0f1 before 7ae9f55a495077f838bab466411ee6f38574df9b
affected

b121d84882b97b8668be0b95e9ba50cfd01aa0f1 before b1b04b56745bc79286c80aa876fabfab1e08ebf1
affected

b121d84882b97b8668be0b95e9ba50cfd01aa0f1 before 5f1c7031e044cb2fba82836d55cc235e2ad619dc
affected

Default status
affected

4.12
affected

Any version before 4.12
unaffected

4.14.322
unaffected

4.19.291
unaffected

5.4.253
unaffected

5.10.190
unaffected

5.15.124
unaffected

6.1.43
unaffected

6.4.8
unaffected

6.5
unaffected

References

git.kernel.org/...c/9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6

git.kernel.org/...c/663fff29fd613e2b0d30c4138157312ba93c4939

git.kernel.org/...c/5373a1aa91b2298f9305794b8270cf9896be96b6

git.kernel.org/...c/caac4b6c15b66feae4d83f602e1e46f124540202

git.kernel.org/...c/baf420e30364ef9efe3e29a5c0e01e612aebf3fe

git.kernel.org/...c/7ae9f55a495077f838bab466411ee6f38574df9b

git.kernel.org/...c/b1b04b56745bc79286c80aa876fabfab1e08ebf1

git.kernel.org/...c/5f1c7031e044cb2fba82836d55cc235e2ad619dc

cve.org (CVE-2023-53554)

nvd.nist.gov (CVE-2023-53554)

Download JSON