CVE-2025-38348
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
10/07/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()<br />
<br />
Robert Morris reported:<br />
<br />
|If a malicious USB device pretends to be an Intersil p54 wifi<br />
|interface and generates an eeprom_readback message with a large<br />
|eeprom->v1.len, p54_rx_eeprom_readback() will copy data from the<br />
|message beyond the end of priv->eeprom.<br />
|<br />
|static void p54_rx_eeprom_readback(struct p54_common *priv,<br />
| struct sk_buff *skb)<br />
|{<br />
| struct p54_hdr *hdr = (struct p54_hdr *) skb->data;<br />
| struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr->data;<br />
|<br />
| if (priv->fw_var >= 0x509) {<br />
| memcpy(priv->eeprom, eeprom->v2.data,<br />
| le16_to_cpu(eeprom->v2.len));<br />
| } else {<br />
| memcpy(priv->eeprom, eeprom->v1.data,<br />
| le16_to_cpu(eeprom->v1.len));<br />
| }<br />
| [...]<br />
<br />
The eeprom->v{1,2}.len is set by the driver in p54_download_eeprom().<br />
The device is supposed to provide the same length back to the driver.<br />
But yes, it&#39;s possible (like shown in the report) to alter the value<br />
to something that causes a crash/panic due to overrun.<br />
<br />
This patch addresses the issue by adding the size to the common device<br />
context, so p54_rx_eeprom_readback no longer relies on possibly tampered<br />
values... That said, it also checks if the "firmware" altered the value<br />
and no longer copies them.<br />
<br />
The one, small saving grace is: Before the driver tries to read the eeprom,<br />
it needs to upload >a
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.28 (including) | 5.4.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036
- https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422
- https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57
- https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb
- https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94
- https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d
- https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99
- https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



