CVE-2023-54286
Buffer Overflow in Linux iwlwifi Driver Causes Kernel Crash
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | iwlwifi | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow issue in the Linux kernel's iwlwifi driver. Specifically, when a TKIP key is received, it can be up to 32 bytes long because it may include MIC rx/tx keys. However, the iwlwifi driver copies this key into a field (iwl_keyinfo.key) that can only hold 16 bytes, causing an overflow. This overflow leads to a detected field-spanning write, which can cause system instability or crashes. The fix involves adding a check to ensure that no more data than the field can hold is copied.
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes due to buffer overflow in the wireless driver. It may lead to kernel warnings and backtraces, potentially affecting the reliability of wireless networking on affected devices. While no direct security impact like privilege escalation is mentioned, such memory corruption issues can sometimes be exploited or cause denial of service.