-

CVE-2023-53226

In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix OOB and integer underflow when rx packets

Make sure mwifiex_process_mgmt_packet,
mwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,
mwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet
not out-of-bounds access the skb->data buffer.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < f517c97fc129995de77dd06aa5a74f909ebf568f
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 8824aa4ab62c800f75d96f48e1883a5f56ec5869
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 29eca8b7863d1d7de6c5b746b374e3487d14f154
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 3fe3923d092e22d87d1ed03e2729db444b8c1331
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 3975e21d4d01efaf0296ded40d11c06589c49245
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < a7300e3800e9fd5405e88ce67709c1a97783b9c8
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 650d1bc02fba7b42f476d8b6643324abac5921ed
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
Version < 11958528161731c58e105b501ed60b83a91ea941
Version 2dbaf751b1dec3a603130a475f94cc4d3f404362
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.7
Status affected
Version < 3.7
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.53
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String