In the Linux kernel, the following vulnerability has been resolved:
wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex
Apparently the hex passphrase mechanism does not work on newer
chips/firmware (e.g. BCM4387). It seems there was a simple way of
passing it in binary all along, so use that and avoid the hexification.
OpenBSD has been doing it like this from the beginning, so this should
work on all chips.
Also clear the structure before setting the PMK. This was leaking
uninitialized stack contents to the device.
CVSS
No CVSS.
References
Configurations
No configuration.
History
22 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-22 14:15
Updated : 2025-10-22 21:12
NVD link : CVE-2023-53715
Mitre link : CVE-2023-53715
CVE.ORG link : CVE-2023-53715
JSON object : View
Products Affected
No product.
CWE
No CWE.
