-
CVE-2023-53554
- EPSS 0.03%
- Published 04.10.2025 15:16:59
- Last modified 06.10.2025 14:56:21
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6
Version
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Status
affected
Version <
663fff29fd613e2b0d30c4138157312ba93c4939
Version
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Status
affected
Version <
5373a1aa91b2298f9305794b8270cf9896be96b6
Version
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Status
affected
Version <
caac4b6c15b66feae4d83f602e1e46f124540202
Version
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Status
affected
Version <
baf420e30364ef9efe3e29a5c0e01e612aebf3fe
Version
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Status
affected
Version <
7ae9f55a495077f838bab466411ee6f38574df9b
Version
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Status
affected
Version <
b1b04b56745bc79286c80aa876fabfab1e08ebf1
Version
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Status
affected
Version <
5f1c7031e044cb2fba82836d55cc235e2ad619dc
Version
b121d84882b97b8668be0b95e9ba50cfd01aa0f1
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.12
Status
affected
Version <
4.12
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.322
Status
unaffected
Version <=
4.19.*
Version
4.19.291
Status
unaffected
Version <=
5.4.*
Version
5.4.253
Status
unaffected
Version <=
5.10.*
Version
5.10.190
Status
unaffected
Version <=
5.15.*
Version
5.15.124
Status
unaffected
Version <=
6.1.*
Version
6.1.43
Status
unaffected
Version <=
6.4.*
Version
6.4.8
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.075 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|