CVE-2023-53213

Source
https://cve.org/CVERecord?id=CVE-2023-53213
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53213.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53213
Downstream
Related
Published
2025-09-15T14:21:41.433Z
Modified
2026-04-11T12:46:42.878666Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: slab-out-of-bounds read in brcmfgetassoc_ies()

Fix a slab-out-of-bounds read that occurs in kmemdup() called from brcmfgetassocies(). The bug could occur when associnfo->reqlen, data from a URB provided by a USB device, is bigger than the size of buffer which is defined as WLEXTRABUFMAX.

Add the size check for reqlen/resplen of assoc_info.

Found by a modified version of syzkaller.

[ 46.592467][ T7] ================================================================== [ 46.594687][ T7] BUG: KASAN: slab-out-of-bounds in kmemdup+0x3e/0x50 [ 46.596572][ T7] Read of size 3014656 at addr ffff888019442000 by task kworker/0:1/7 [ 46.598575][ T7] [ 46.599157][ T7] CPU: 0 PID: 7 Comm: kworker/0:1 Tainted: G O 5.14.0+ #145 [ 46.601333][ T7] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014 [ 46.604360][ T7] Workqueue: events brcmffweheventworker [ 46.605943][ T7] Call Trace: [ 46.606584][ T7] dumpstacklvl+0x8e/0xd1 [ 46.607446][ T7] printaddressdescription.constprop.0.cold+0x93/0x334 [ 46.608610][ T7] ? kmemdup+0x3e/0x50 [ 46.609341][ T7] kasanreport.cold+0x79/0xd5 [ 46.610151][ T7] ? kmemdup+0x3e/0x50 [ 46.610796][ T7] kasancheckrange+0x14e/0x1b0 [ 46.611691][ T7] memcpy+0x20/0x60 [ 46.612323][ T7] kmemdup+0x3e/0x50 [ 46.612987][ T7] brcmfgetassocies+0x967/0xf60 [ 46.613904][ T7] ? brcmfnotifyvifevent+0x3d0/0x3d0 [ 46.614831][ T7] ? lockchaincount+0x20/0x20 [ 46.615683][ T7] ? marklock.part.0+0xfc/0x2770 [ 46.616552][ T7] ? lockchaincount+0x20/0x20 [ 46.617409][ T7] ? marklock.part.0+0xfc/0x2770 [ 46.618244][ T7] ? lockchaincount+0x20/0x20 [ 46.619024][ T7] brcmfbssconnectdone.constprop.0+0x241/0x2e0 [ 46.620019][ T7] ? brcmfparseconfiguresecurity.isra.0+0x2a0/0x2a0 [ 46.620818][ T7] ? __lockacquire+0x181f/0x5790 [ 46.621462][ T7] brcmfnotifyconnectstatus+0x448/0x1950 [ 46.622134][ T7] ? rcureadlockbhheld+0xb0/0xb0 [ 46.622736][ T7] ? brcmfcfg80211joinibss+0x7b0/0x7b0 [ 46.623390][ T7] ? findheldlock+0x2d/0x110 [ 46.623962][ T7] ? brcmffweheventworker+0x19f/0xc60 [ 46.624603][ T7] ? markheldlocks+0x9f/0xe0 [ 46.625145][ T7] ? lockdephardirqsonprepare+0x3e0/0x3e0 [ 46.625871][ T7] ? brcmfcfg80211joinibss+0x7b0/0x7b0 [ 46.626545][ T7] brcmffwehcalleventhandler.isra.0+0x90/0x100 [ 46.627338][ T7] brcmffweheventworker+0x557/0xc60 [ 46.627962][ T7] ? brcmffwehcalleventhandler.isra.0+0x100/0x100 [ 46.628736][ T7] ? rcureadlockschedheld+0xa1/0xd0 [ 46.629396][ T7] ? rcureadlockbhheld+0xb0/0xb0 [ 46.629970][ T7] ? lockdephardirqsonprepare+0x273/0x3e0 [ 46.630649][ T7] processonework+0x92b/0x1460 [ 46.631205][ T7] ? pwqdecnrinflight+0x330/0x330 [ 46.631821][ T7] ? rwlockbug.part.0+0x90/0x90 [ 46.632347][ T7] workerthread+0x95/0xe00 [ 46.632832][ T7] ? __kthreadparkme+0x115/0x1e0 [ 46.633393][ T7] ? processonework+0x1460/0x1460 [ 46.633957][ T7] kthread+0x3a1/0x480 [ 46.634369][ T7] ? setkthreadstruct+0x120/0x120 [ 46.634933][ T7] retfromfork+0x1f/0x30 [ 46.635431][ T7] [ 46.635687][ T7] Allocated by task 7: [ 46.636151][ T7] kasansave_stack+0x1b/0x40 [ 46.636628][ T7] __kasankmalloc+0x7c/0x90 [ 46.637108][ T7] kmemcachealloctrace+0x19e/0x330 [ 46.637696][ T7] brcmfcfg80211attach+0x4a0/0x4040 [ 46.638275][ T7] brcmfattach+0x389/0xd40 [ 46.638739][ T7] brcmfusbprobe+0x12de/0x1690 [ 46.639279][ T7] usbprobeinterface+0x2aa/0x760 [ 46.639820][ T7] reallyprobe+0x205/0xb70 [ 46.640342][ T7] __driverprobedevice+0 ---truncated---

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53213.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cf2b448852abd47cee21007b8313fbf962bf3c9a
Fixed
ac5305e5d227b9af3aae25fa83380d3ff0225b73
Fixed
39f9bd880abac6068bedb24a4e16e7bd26bf92da
Fixed
425eea395f1f5ae349fb55f7fe51d833a5324bfe
Fixed
549825602e3e6449927ca1ea1a08fd89868439df
Fixed
936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8
Fixed
e29661611e6e71027159a3140e818ef3b99f32dd
Fixed
228186629ea970cc78b7d7d5f593f2d32fddf9f6
Fixed
21bee3e649d87f78fe8aef6ae02edd3d6f310fd0
Fixed
0da40e018fd034d87c9460123fa7f897b69fdee7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53213.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.37
Fixed
4.14.315
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.283
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.243
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.180
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.110
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.27
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.14
Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.3.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53213.json"