-
CVE-2025-38348
- EPSS 0.04%
- Published 10.07.2025 08:15:15
- Last modified 10.07.2025 13:17:30
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() Robert Morris reported: |If a malicious USB device pretends to be an Intersil p54 wifi |interface and generates an eeprom_readback message with a large |eeprom->v1.len, p54_rx_eeprom_readback() will copy data from the |message beyond the end of priv->eeprom. | |static void p54_rx_eeprom_readback(struct p54_common *priv, | struct sk_buff *skb) |{ | struct p54_hdr *hdr = (struct p54_hdr *) skb->data; | struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr->data; | | if (priv->fw_var >= 0x509) { | memcpy(priv->eeprom, eeprom->v2.data, | le16_to_cpu(eeprom->v2.len)); | } else { | memcpy(priv->eeprom, eeprom->v1.data, | le16_to_cpu(eeprom->v1.len)); | } | [...] The eeprom->v{1,2}.len is set by the driver in p54_download_eeprom(). The device is supposed to provide the same length back to the driver. But yes, it's possible (like shown in the report) to alter the value to something that causes a crash/panic due to overrun. This patch addresses the issue by adding the size to the common device context, so p54_rx_eeprom_readback no longer relies on possibly tampered values... That said, it also checks if the "firmware" altered the value and no longer copies them. The one, small saving grace is: Before the driver tries to read the eeprom, it needs to upload >a< firmware. the vendor firmware has a proprietary license and as a reason, it is not present on most distributions by default.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
12134f79e53eb56b0b0b7447fa0c512acf6a8422
Version
7cb770729ba895f73253dfcd46c3fcba45d896f9
Status
affected
Version <
9701f842031b825e2fd5f22d064166f8f13f6e4d
Version
7cb770729ba895f73253dfcd46c3fcba45d896f9
Status
affected
Version <
1f7f8168abe8cbe845ab8bb557228d44784a6b57
Version
7cb770729ba895f73253dfcd46c3fcba45d896f9
Status
affected
Version <
f39b2f8c1549a539846e083790fad396ef6cd802
Version
7cb770729ba895f73253dfcd46c3fcba45d896f9
Status
affected
Version <
0e4dc150423b829c35cbcf399481ca11594fc036
Version
7cb770729ba895f73253dfcd46c3fcba45d896f9
Status
affected
Version <
6d05390d20f110de37d051a3e063ef0a542d01fb
Version
7cb770729ba895f73253dfcd46c3fcba45d896f9
Status
affected
Version <
714afb4c38edd19a057d519c1f9c5d164b43de94
Version
7cb770729ba895f73253dfcd46c3fcba45d896f9
Status
affected
Version <
da1b9a55ff116cb040528ef664c70a4eec03ae99
Version
7cb770729ba895f73253dfcd46c3fcba45d896f9
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.28
Status
affected
Version <
2.6.28
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.295
Status
unaffected
Version <=
5.10.*
Version
5.10.239
Status
unaffected
Version <=
5.15.*
Version
5.15.186
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.95
Status
unaffected
Version <=
6.12.*
Version
6.12.35
Status
unaffected
Version <=
6.15.*
Version
6.15.4
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.098 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|