{"id":"CVE-2023-52525","summary":"wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet\n\nOnly skip the code path trying to access the rfc1042 headers when the\nbuffer is too small, so the driver can still process packets without\nrfc1042 headers.","modified":"2026-04-02T09:42:58.728986Z","published":"2024-03-02T21:52:31.638Z","related":["SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1490-1","SUSE-SU-2026:0473-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52525.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38"},{"type":"WEB","url":"https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99"},{"type":"WEB","url":"https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52525.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52525"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f517c97fc129995de77dd06aa5a74f909ebf568f"},{"fixed":"71b1d2b57f145c8469aa9346f0fd57bf59b2b89c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8824aa4ab62c800f75d96f48e1883a5f56ec5869"},{"fixed":"16cc18b9080892d1a0200a38e36ae52e464bc555"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"29eca8b7863d1d7de6c5b746b374e3487d14f154"},{"fixed":"b8e260654a29de872e7cb85387d8ab8974694e8e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3fe3923d092e22d87d1ed03e2729db444b8c1331"},{"fixed":"10a18c8bac7f60d32b7af22da03b66f350beee38"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02"},{"fixed":"5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3975e21d4d01efaf0296ded40d11c06589c49245"},{"fixed":"6b706286473db4fd54b5f869faa67f4a8cb18e99"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"650d1bc02fba7b42f476d8b6643324abac5921ed"},{"fixed":"be2ff39b1504c5359f4a083c1cfcad21d666e216"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"11958528161731c58e105b501ed60b83a91ea941"},{"fixed":"aef7a0300047e7b4707ea0411dc9597cba108fc8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"a7300e3800e9fd5405e88ce67709c1a97783b9c8"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52525.json"}}],"schema_version":"1.7.5"}