CVE-2023-53554

Source
https://cve.org/CVERecord?id=CVE-2023-53554
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53554.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53554
Downstream
Related
Published
2025-10-04T15:16:59.749Z
Modified
2026-03-20T12:33:13.316105Z
Summary
staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()
Details

In the Linux kernel, the following vulnerability has been resolved:

staging: ks7010: potential buffer overflow in kswlansetencodeext()

The "exc->keylen" is a u16 that comes from the user. If it's over IWENCODINGTOKENMAX (64) that could lead to memory corruption.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53554.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Fixed
9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6
Fixed
663fff29fd613e2b0d30c4138157312ba93c4939
Fixed
5373a1aa91b2298f9305794b8270cf9896be96b6
Fixed
caac4b6c15b66feae4d83f602e1e46f124540202
Fixed
baf420e30364ef9efe3e29a5c0e01e612aebf3fe
Fixed
7ae9f55a495077f838bab466411ee6f38574df9b
Fixed
b1b04b56745bc79286c80aa876fabfab1e08ebf1
Fixed
5f1c7031e044cb2fba82836d55cc235e2ad619dc

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53554.json"