-
CVE-2023-53524
- EPSS 0.04%
- Veröffentlicht 01.10.2025 12:15:56
- Zuletzt bearbeitet 02.10.2025 19:11:46
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf An integer overflow occurs in the iwl_write_to_user_buf() function, which is called by the iwl_dbgfs_monitor_data_read() function. static bool iwl_write_to_user_buf(char __user *user_buf, ssize_t count, void *buf, ssize_t *size, ssize_t *bytes_copied) { int buf_size_left = count - *bytes_copied; buf_size_left = buf_size_left - (buf_size_left % sizeof(u32)); if (*size > buf_size_left) *size = buf_size_left; If the user passes a SIZE_MAX value to the "ssize_t count" parameter, the ssize_t count parameter is assigned to "int buf_size_left". Then compare "*size" with "buf_size_left" . Here, "buf_size_left" is a negative number, so "*size" is assigned "buf_size_left" and goes into the third argument of the copy_to_user function, causing a heap overflow. This is not a security vulnerability because iwl_dbgfs_monitor_data_read() is a debugfs operation with 0400 privileges.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
0ad8dd870aa187d0c21d032bb2c6433559075eec
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
059e426d666a41e26b184c177c1ca3ee2d6fa1b6
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
82f877ec9b041edc4c7c509c605cc3393d837bf0
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
eb1ef44efac797b384d361a76e33f77027c29a14
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
de78456976026102babe66258c228691ca5677c0
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
58d1b717879bfeabe09b35e41ad667c79933eb2e
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version <=
5.4.*
Version
5.4.244
Status
unaffected
Version <=
5.10.*
Version
5.10.181
Status
unaffected
Version <=
5.15.*
Version
5.15.113
Status
unaffected
Version <=
6.1.*
Version
6.1.30
Status
unaffected
Version <=
6.3.*
Version
6.3.4
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.116 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|