-
CVE-2025-68255
- EPSS 0.06%
- Veröffentlicht 16.12.2025 14:44:58
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing The Supported Rates IE length from an incoming Association Request frame was used directly as the memcpy() length when copying into a fixed-size 16-byte stack buffer (supportRate). A malicious station can advertise an IE length larger than 16 bytes, causing a stack buffer overflow. Clamp ie_len to the buffer size before copying the Supported Rates IE, and correct the bounds check when merging Extended Supported Rates to prevent a second potential overflow. This prevents kernel stack corruption triggered by malformed association requests.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version <
49b7806851f93fd342838c93f4f765e0cc5029b0
Status
affected
Version
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version <
4445adedae770037078803d1ce41f9e88a1944b6
Status
affected
Version
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version <
d129dc2a5d59b4d9cd2cc0b6eeb04df8461199f0
Status
affected
Version
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version <
34620eb602aa432f090b2b784ee5c5070fb16cf9
Status
affected
Version
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version <
61871c83259a511980ec2664964cecc69005398b
Status
affected
Version
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version <
25411f5fcf5743131158f337c99c2bbf3f8477f5
Status
affected
Version
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version <
e841d8ea722315b781c4fc5bf4f7670fbca88875
Status
affected
Version
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version <
6ef0e1c10455927867cac8f0ed6b49f328f8cf95
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.12
Status
affected
Version
0
Version <
4.12
Status
unaffected
Version <=
5.10.*
Version
5.10.248
Status
unaffected
Version <=
5.15.*
Version
5.15.198
Status
unaffected
Version <=
6.1.*
Version
6.1.160
Status
unaffected
Version <=
6.6.*
Version
6.6.120
Status
unaffected
Version <=
6.12.*
Version
6.12.62
Status
unaffected
Version <=
6.17.*
Version
6.17.12
Status
unaffected
Version <=
6.18.*
Version
6.18.1
Status
unaffected
Version <=
*
Version
6.19
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.189 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|