CVE-2023-53589

Source
https://cve.org/CVERecord?id=CVE-2023-53589
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53589.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53589
Downstream
Related
Published
2025-10-04T15:44:04.047Z
Modified
2026-03-11T07:54:07.782890355Z
Summary
wifi: iwlwifi: mvm: don't trust firmware n_channels
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't trust firmware n_channels

If the firmware sends us a corrupted MCC response with nchannels much larger than the command response can be, we might copy far too much (uninitialized) memory and even crash if the nchannels is large enough to make it run out of the one page allocated for the FW response.

Fix that by checking the lengths. Doing a < comparison would be sufficient, but the firmware should be doing it correctly, so check more strictly.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53589.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dcaf9f5ecb6f395152609bdc40660d9b593dca63
Fixed
e519a404a5bbba37693cb10fa61794a5fce4fd9b
Fixed
d0d39bed9e95f27a246be91c5929254ac043ed30
Fixed
05ad5a4d421ce65652fcb24d46b7e273130240d6
Fixed
557ba100d8cf3661ff8d71c0b4a2cba8db555ec2
Fixed
c176f03350954b795322de0bfe1d7b514db41f45
Fixed
682b6dc29d98e857e6ca4bbc077c7dc2899b7473

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53589.json"