CVE-2023-53717

high

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() Fix a stack-out-of-bounds write that occurs in a WMI response callback function that is called after a timeout occurs in ath9k_wmi_cmd(). The callback writes to wmi->cmd_rsp_buf, a stack-allocated buffer that could no longer be valid when a timeout occurs. Set wmi->last_seq_id to 0 when a timeout occurred. Found by a modified version of syzkaller. BUG: KASAN: stack-out-of-bounds in ath9k_wmi_ctrl_rx Write of size 4 Call Trace: memcpy ath9k_wmi_ctrl_rx ath9k_htc_rx_msg ath9k_hif_usb_reg_in_cb __usb_hcd_giveback_urb usb_hcd_giveback_urb dummy_timer call_timer_fn run_timer_softirq __do_softirq irq_exit_rcu sysvec_apic_timer_interrupt

References

https://git.kernel.org/stable/c/bf6dc175a2b53098a69db1236d9d53982f4b1bc0

https://git.kernel.org/stable/c/ae4933b4f17de8e2b7ff6f91b17d3b0099a6d6bc

https://git.kernel.org/stable/c/8f28513d9520184059530c01a9f928a1b3809d3f

https://git.kernel.org/stable/c/8a2f35b9830692f7a616f2f627f943bc748af13a

https://git.kernel.org/stable/c/89a33c3c847b19b19205cde1d924df2a6c70d8eb

https://git.kernel.org/stable/c/78b56b0a613a87b61290b95be497fdfe2fe58aa6

https://git.kernel.org/stable/c/554048a72d7ecfdd58cc1bfb56e0a1864e64e82c

https://git.kernel.org/stable/c/1af7eacfad45149c54893a8a9df9e92ef89f0a90

Details

Source: Mitre, NVD

Published: 2025-10-22

Updated: 2025-10-22

Risk Information

CVSS v2

Base Score: 6

Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00024