-

CVE-2023-53226

In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix OOB and integer underflow when rx packets

Make sure mwifiex_process_mgmt_packet,
mwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,
mwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet
not out-of-bounds access the skb->data buffer.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < f517c97fc129995de77dd06aa5a74f909ebf568f
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 8824aa4ab62c800f75d96f48e1883a5f56ec5869
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 29eca8b7863d1d7de6c5b746b374e3487d14f154
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 3fe3923d092e22d87d1ed03e2729db444b8c1331
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 3975e21d4d01efaf0296ded40d11c06589c49245
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < a7300e3800e9fd5405e88ce67709c1a97783b9c8
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 650d1bc02fba7b42f476d8b6643324abac5921ed
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 11958528161731c58e105b501ed60b83a91ea941
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.7
Status affected
Version < 3.7
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.53
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string