In the Linux kernel, the following vulnerability has been resolved:
staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()
The "exc->key_len" is a u16 that comes from the user. If it's over
IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Oct 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 06 Oct 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Sat, 04 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption. | |
Title | staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-04T15:16:59.749Z
Reserved: 2025-10-04T15:14:15.922Z
Link: CVE-2023-53554

No data.

Status : Awaiting Analysis
Published: 2025-10-04T16:15:50.697
Modified: 2025-10-06T14:56:21.733
Link: CVE-2023-53554
