{"id":"CVE-2023-53226","summary":"wifi: mwifiex: Fix OOB and integer underflow when rx packets","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix OOB and integer underflow when rx packets\n\nMake sure mwifiex_process_mgmt_packet,\nmwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,\nmwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet\nnot out-of-bounds access the skb-\u003edata buffer.","modified":"2026-04-11T12:46:43.188010Z","published":"2025-09-15T14:21:55.884Z","related":["ALSA-2025:19440","ALSA-2025:19447","SUSE-SU-2025:03600-1","SUSE-SU-2025:03614-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","SUSE-SU-2026:0473-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53226.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941"},{"type":"WEB","url":"https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331"},{"type":"WEB","url":"https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53226.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53226"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2dbaf751b1dec3a603130a475f94cc4d3f404362"},{"fixed":"f517c97fc129995de77dd06aa5a74f909ebf568f"},{"fixed":"8824aa4ab62c800f75d96f48e1883a5f56ec5869"},{"fixed":"29eca8b7863d1d7de6c5b746b374e3487d14f154"},{"fixed":"3fe3923d092e22d87d1ed03e2729db444b8c1331"},{"fixed":"7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02"},{"fixed":"3975e21d4d01efaf0296ded40d11c06589c49245"},{"fixed":"a7300e3800e9fd5405e88ce67709c1a97783b9c8"},{"fixed":"650d1bc02fba7b42f476d8b6643324abac5921ed"},{"fixed":"11958528161731c58e105b501ed60b83a91ea941"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53226.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.7.0"},{"fixed":"4.14.326"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.295"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.257"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.195"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.132"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.5.0"},{"fixed":"6.5.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53226.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}