CVE-2025-68255
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/12/2025
Última modificación:
19/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing<br />
<br />
The Supported Rates IE length from an incoming Association Request frame<br />
was used directly as the memcpy() length when copying into a fixed-size<br />
16-byte stack buffer (supportRate). A malicious station can advertise an<br />
IE length larger than 16 bytes, causing a stack buffer overflow.<br />
<br />
Clamp ie_len to the buffer size before copying the Supported Rates IE,<br />
and correct the bounds check when merging Extended Supported Rates to<br />
prevent a second potential overflow.<br />
<br />
This prevents kernel stack corruption triggered by malformed association<br />
requests.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/25411f5fcf5743131158f337c99c2bbf3f8477f5
- https://git.kernel.org/stable/c/34620eb602aa432f090b2b784ee5c5070fb16cf9
- https://git.kernel.org/stable/c/4445adedae770037078803d1ce41f9e88a1944b6
- https://git.kernel.org/stable/c/49b7806851f93fd342838c93f4f765e0cc5029b0
- https://git.kernel.org/stable/c/61871c83259a511980ec2664964cecc69005398b
- https://git.kernel.org/stable/c/6ef0e1c10455927867cac8f0ed6b49f328f8cf95
- https://git.kernel.org/stable/c/d129dc2a5d59b4d9cd2cc0b6eeb04df8461199f0
- https://git.kernel.org/stable/c/e841d8ea722315b781c4fc5bf4f7670fbca88875



