{"id":"CVE-2023-53226","summary":"wifi: mwifiex: Fix OOB and integer underflow when rx packets","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix OOB and integer underflow when rx packets\n\nMake sure mwifiex_process_mgmt_packet,\nmwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,\nmwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet\nnot out-of-bounds access the skb-\u003edata buffer.","modified":"2026-04-02T09:43:49.739400Z","published":"2025-09-15T14:21:55.884Z","related":["ALSA-2025:19440","ALSA-2025:19447","SUSE-SU-2025:03600-1","SUSE-SU-2025:03614-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","SUSE-SU-2026:0473-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53226.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941"},{"type":"WEB","url":"https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331"},{"type":"WEB","url":"https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53226.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53226"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2dbaf751b1dec3a603130a475f94cc4d3f404362"},{"fixed":"f517c97fc129995de77dd06aa5a74f909ebf568f"},{"fixed":"8824aa4ab62c800f75d96f48e1883a5f56ec5869"},{"fixed":"29eca8b7863d1d7de6c5b746b374e3487d14f154"},{"fixed":"3fe3923d092e22d87d1ed03e2729db444b8c1331"},{"fixed":"7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02"},{"fixed":"3975e21d4d01efaf0296ded40d11c06589c49245"},{"fixed":"a7300e3800e9fd5405e88ce67709c1a97783b9c8"},{"fixed":"650d1bc02fba7b42f476d8b6643324abac5921ed"},{"fixed":"11958528161731c58e105b501ed60b83a91ea941"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53226.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}