In the Linux kernel, the following vulnerability has been resolved:
staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()
The "exc->key_len" is a u16 that comes from the user. If it's over
IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.
Metrics
Affected Vendors & Products
References
History
Sat, 04 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption. | |
Title | staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-04T15:16:59.749Z
Reserved: 2025-10-04T15:14:15.922Z
Link: CVE-2023-53554

No data.

Status : Received
Published: 2025-10-04T16:15:50.697
Modified: 2025-10-04T16:15:50.697
Link: CVE-2023-53554

No data.

No data.