{"id":"CVE-2023-53554","summary":"staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()\n\nThe \"exc-\u003ekey_len\" is a u16 that comes from the user.  If it's over\nIW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.","modified":"2026-04-02T09:44:27.043829Z","published":"2025-10-04T15:16:59.749Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4111-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4301-1","SUSE-SU-2025:4320-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53554.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/5373a1aa91b2298f9305794b8270cf9896be96b6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5f1c7031e044cb2fba82836d55cc235e2ad619dc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/663fff29fd613e2b0d30c4138157312ba93c4939"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7ae9f55a495077f838bab466411ee6f38574df9b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b1b04b56745bc79286c80aa876fabfab1e08ebf1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/baf420e30364ef9efe3e29a5c0e01e612aebf3fe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/caac4b6c15b66feae4d83f602e1e46f124540202"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53554.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53554"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b121d84882b97b8668be0b95e9ba50cfd01aa0f1"},{"fixed":"9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6"},{"fixed":"663fff29fd613e2b0d30c4138157312ba93c4939"},{"fixed":"5373a1aa91b2298f9305794b8270cf9896be96b6"},{"fixed":"caac4b6c15b66feae4d83f602e1e46f124540202"},{"fixed":"baf420e30364ef9efe3e29a5c0e01e612aebf3fe"},{"fixed":"7ae9f55a495077f838bab466411ee6f38574df9b"},{"fixed":"b1b04b56745bc79286c80aa876fabfab1e08ebf1"},{"fixed":"5f1c7031e044cb2fba82836d55cc235e2ad619dc"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53554.json"}}],"schema_version":"1.7.5"}