-

CVE-2025-68255

staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing

In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing

The Supported Rates IE length from an incoming Association Request frame
was used directly as the memcpy() length when copying into a fixed-size
16-byte stack buffer (supportRate). A malicious station can advertise an
IE length larger than 16 bytes, causing a stack buffer overflow.

Clamp ie_len to the buffer size before copying the Supported Rates IE,
and correct the bounds check when merging Extended Supported Rates to
prevent a second potential overflow.

This prevents kernel stack corruption triggered by malformed association
requests.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version < 49b7806851f93fd342838c93f4f765e0cc5029b0
Status affected
Version 554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version < 4445adedae770037078803d1ce41f9e88a1944b6
Status affected
Version 554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version < d129dc2a5d59b4d9cd2cc0b6eeb04df8461199f0
Status affected
Version 554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version < 34620eb602aa432f090b2b784ee5c5070fb16cf9
Status affected
Version 554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version < 61871c83259a511980ec2664964cecc69005398b
Status affected
Version 554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version < 25411f5fcf5743131158f337c99c2bbf3f8477f5
Status affected
Version 554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version < e841d8ea722315b781c4fc5bf4f7670fbca88875
Status affected
Version 554c0a3abf216c991c5ebddcdb2c08689ecd290b
Version < 6ef0e1c10455927867cac8f0ed6b49f328f8cf95
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.12
Status affected
Version 0
Version < 4.12
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.62
Status unaffected
Version <= 6.17.*
Version 6.17.12
Status unaffected
Version <= 6.18.*
Version 6.18.1
Status unaffected
Version <= *
Version 6.19
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.189
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.