CVE-2023-53213
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 4.14.315 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.283 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.243 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.180 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.110 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.27 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.14 (exc) |
| linux | linux_kernel | From 6.3 (inc) to 6.3.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a slab-out-of-bounds read in the Linux kernel's brcmfmac WiFi driver, specifically in the function brcmf_get_assoc_ies(). It occurs when the length of association information (req_len) provided by a USB device is larger than the buffer size defined by WL_EXTRA_BUF_MAX. This causes the kmemdup() function to read beyond the allocated memory buffer, potentially leading to memory corruption or crashes. The issue was fixed by adding size checks for req_len and resp_len to prevent out-of-bounds reads.
How can this vulnerability impact me? :
This vulnerability can lead to a kernel memory out-of-bounds read, which may cause system instability, crashes, or potentially allow an attacker to read sensitive kernel memory. Since it involves the WiFi driver and USB device data, it could be exploited by a malicious USB device or crafted WiFi frames to cause denial of service or information disclosure on affected systems.