CVE-2023-54286 — Stack-based Buffer Overflow in Linux
Severity
7.0HIGH
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace
A received TKIP key may be up to 32 bytes because it may contain
MIC rx/tx keys too. These are not used by iwl and copying these
over overflows the iwl_keyinfo.key field.
Add a check to not copy more data to iwl_keyinfo.key then will fit.
This fixes backtraces like this one:
memcpy: detected field-spanning write (size 32) of single field "sta_cmd.key.ke…
Affected Packages4 packages
▶CVEListV5linux/linux5a3d9882b84edf5fa8e8ca33a5d6df25e2e727a5 — 76b5ea43ad2fb4f726ddfaff839430a706e7d7c2+8
🔴Vulnerability Details
3OSV▶
CVE-2023-54286: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace A received↗2025-12-30
GHSA▶
GHSA-gwwq-p8rf-2xr4: In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace
A receiv↗2025-12-30