{"id":"CVE-2023-53715","summary":"wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex\n\nApparently the hex passphrase mechanism does not work on newer\nchips/firmware (e.g. BCM4387). It seems there was a simple way of\npassing it in binary all along, so use that and avoid the hexification.\n\nOpenBSD has been doing it like this from the beginning, so this should\nwork on all chips.\n\nAlso clear the structure before setting the PMK. This was leaking\nuninitialized stack contents to the device.","modified":"2026-03-20T12:33:18.693948Z","published":"2025-10-22T13:23:48.905Z","related":["SUSE-SU-2025:4111-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4189-1","SUSE-SU-2025:4320-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53715.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1687845eb8f37360a9ee849a3587ab659b090773"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2bc34facb90ceeff6f8c17d2006575a6d07c3825"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2fa3a5226b05e0a797c68b9609dcebe0cd236b27"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e8dc0e5c7636efaadbd7e488acd34b4291c0431"},{"type":"WEB","url":"https://git.kernel.org/stable/c/56c7e9c39bd54fd753c0c4b1ed10278cbd3a5f02"},{"type":"WEB","url":"https://git.kernel.org/stable/c/89b89e52153fda2733562776c7c9d9d3ebf8dd6d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e242c66f7ecfe8f5b6eb308f4ea464fd8589c866"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f8a6c53ff1d91acd5a20eb627edbffd816eb9a4e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53715.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53715"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b8a64f0e96c2b258321ee03975aeb0f5e88a055b"},{"fixed":"1687845eb8f37360a9ee849a3587ab659b090773"},{"fixed":"2bc34facb90ceeff6f8c17d2006575a6d07c3825"},{"fixed":"56c7e9c39bd54fd753c0c4b1ed10278cbd3a5f02"},{"fixed":"4e8dc0e5c7636efaadbd7e488acd34b4291c0431"},{"fixed":"e242c66f7ecfe8f5b6eb308f4ea464fd8589c866"},{"fixed":"f8a6c53ff1d91acd5a20eb627edbffd816eb9a4e"},{"fixed":"2fa3a5226b05e0a797c68b9609dcebe0cd236b27"},{"fixed":"89b89e52153fda2733562776c7c9d9d3ebf8dd6d"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53715.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.13.0"},{"fixed":"4.14.316"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.284"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.244"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.181"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.113"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.30"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.3.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53715.json"}}],"schema_version":"1.7.5"}