{"id":"CVE-2023-1380","details":"A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.","modified":"2026-04-16T04:33:47.477400607Z","published":"2023-03-27T21:15:10.623Z","related":["SUSE-SU-2023:2500-1","SUSE-SU-2023:2501-1","SUSE-SU-2023:2502-1","SUSE-SU-2023:2507-1","SUSE-SU-2023:2534-1","SUSE-SU-2023:2537-1","SUSE-SU-2023:2538-1","SUSE-SU-2023:2611-1","SUSE-SU-2023:2646-1","SUSE-SU-2023:2651-1","SUSE-SU-2023:2653-1","SUSE-SU-2023:2782-1","SUSE-SU-2023:2805-1","SUSE-SU-2025:03613-1","SUSE-SU-2025:03614-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03626-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3761-1","openSUSE-SU-2024:12994-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5480"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230511-0001/"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2023/03/14/1"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177883"},{"type":"FIX","url":"https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"3.2.1"},{"fixed":"4.14.315"}]},{"events":[{"introduced":"4.19"},{"fixed":"4.19.283"}]},{"events":[{"introduced":"5.4"},{"fixed":"5.4.243"}]},{"events":[{"introduced":"5.10"},{"fixed":"5.10.180"}]},{"events":[{"introduced":"5.15"},{"fixed":"5.15.110"}]},{"events":[{"introduced":"6.1"},{"fixed":"6.1.27"}]},{"events":[{"introduced":"6.2"},{"fixed":"6.2.14"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3-rc6"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3-rc7"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"22.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1380.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}