CVE-2025-68255

medium

Description

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing The Supported Rates IE length from an incoming Association Request frame was used directly as the memcpy() length when copying into a fixed-size 16-byte stack buffer (supportRate). A malicious station can advertise an IE length larger than 16 bytes, causing a stack buffer overflow. Clamp ie_len to the buffer size before copying the Supported Rates IE, and correct the bounds check when merging Extended Supported Rates to prevent a second potential overflow. This prevents kernel stack corruption triggered by malformed association requests.

References

https://git.kernel.org/stable/c/e841d8ea722315b781c4fc5bf4f7670fbca88875

https://git.kernel.org/stable/c/d129dc2a5d59b4d9cd2cc0b6eeb04df8461199f0

https://git.kernel.org/stable/c/6ef0e1c10455927867cac8f0ed6b49f328f8cf95

https://git.kernel.org/stable/c/61871c83259a511980ec2664964cecc69005398b

https://git.kernel.org/stable/c/49b7806851f93fd342838c93f4f765e0cc5029b0

https://git.kernel.org/stable/c/4445adedae770037078803d1ce41f9e88a1944b6

https://git.kernel.org/stable/c/34620eb602aa432f090b2b784ee5c5070fb16cf9

https://git.kernel.org/stable/c/25411f5fcf5743131158f337c99c2bbf3f8477f5

Details

Source: Mitre, NVD

Published: 2025-12-16

Updated: 2026-01-19

Risk Information

CVSS v2

Base Score: 5.5

Vector: CVSS2#AV:L/AC:H/Au:S/C:N/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 6.3

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: Medium

EPSS

EPSS: 0.0002