In the Linux kernel, the following vulnerability has been resolved:
wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet
Only skip the code path trying to access the rfc1042 headers when the
buffer is too small, so the driver can still process packets without
rfc1042 headers.
References
Configurations
Configuration 1 (hide)
|
History
13 Jan 2025, 20:04
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:* |
|
CWE | CWE-125 | |
References | () https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38 - Patch | |
References | () https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555 - Patch | |
References | () https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6 - Patch | |
References | () https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99 - Patch | |
References | () https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c - Patch | |
References | () https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8 - Patch | |
References | () https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e - Patch | |
References | () https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216 - Patch |
21 Nov 2024, 08:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38 - | |
References | () https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555 - | |
References | () https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6 - | |
References | () https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99 - | |
References | () https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c - | |
References | () https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8 - | |
References | () https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e - | |
References | () https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216 - |
04 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
02 Mar 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-02 22:15
Updated : 2025-01-13 20:04
NVD link : CVE-2023-52525
Mitre link : CVE-2023-52525
CVE.ORG link : CVE-2023-52525
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read