Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-53570
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-04 Oct, 2025 | 15:17
Updated At-04 Oct, 2025 | 15:17
Rejected At-
▼CVE Numbering Authority (CNA)
wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems()

In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems() nl80211_parse_mbssid_elems() uses a u8 variable num_elems to count the number of MBSSID elements in the nested netlink attribute attrs, which can lead to an integer overflow if a user of the nl80211 interface specifies 256 or more elements in the corresponding attribute in userspace. The integer overflow can lead to a heap buffer overflow as num_elems determines the size of the trailing array in elems, and this array is thereafter written to for each element in attrs. Note that this vulnerability only affects devices with the wiphy->mbssid_max_interfaces member set for the wireless physical device struct in the device driver, and can only be triggered by a process with CAP_NET_ADMIN capabilities. Fix this by checking for a maximum of 255 elements in attrs.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/wireless/nl80211.c
Default Status
unaffected
Versions
Affected
  • From dc1e3cb8da8b414b37208b2fb6755fef8122504b before e642eb67b8c10dcce758d549cc81564116e0fa49 (git)
  • From dc1e3cb8da8b414b37208b2fb6755fef8122504b before 7d09f9f255a5f78578deba5454923072bb53b16c (git)
  • From dc1e3cb8da8b414b37208b2fb6755fef8122504b before 6311071a056272e1e761de8d0305e87cc566f734 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/wireless/nl80211.c
Default Status
affected
Versions
Affected
  • 5.16
Unaffected
  • From 0 before 5.16 (semver)
  • From 6.1.46 through 6.1.* (semver)
  • From 6.4.11 through 6.4.* (semver)
  • From 6.5 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/e642eb67b8c10dcce758d549cc81564116e0fa49
N/A
https://git.kernel.org/stable/c/7d09f9f255a5f78578deba5454923072bb53b16c
N/A
https://git.kernel.org/stable/c/6311071a056272e1e761de8d0305e87cc566f734
N/A
Hyperlink: https://git.kernel.org/stable/c/e642eb67b8c10dcce758d549cc81564116e0fa49
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7d09f9f255a5f78578deba5454923072bb53b16c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6311071a056272e1e761de8d0305e87cc566f734
Resource: N/A
Details not found