[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025121610-CVE-2025-68254-b745@gregkh>
Date: Tue, 16 Dec 2025 15:45:11 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-68254: staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing
The Extended Supported Rates (ESR) IE handling in OnBeacon accessed
*(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these
offsets lie within the received frame buffer. A malformed beacon with
an ESR IE positioned at the end of the buffer could cause an
out-of-bounds read, potentially triggering a kernel panic.
Add a boundary check to ensure that the ESR IE body and the subsequent
bytes are within the limits of the frame before attempting to access
them.
This prevents OOB reads caused by malformed beacon frames.
The Linux kernel CVE team has assigned CVE-2025-68254 to this issue.
Affected and fixed versions
===========================
Fixed in 6.12.62 with commit d1ab7f9cee22e7b8a528da9ac953e4193b96cda5
Fixed in 6.17.12 with commit 38292407c2bb5b2b3131aaace4ecc7a829b40b76
Fixed in 6.18.1 with commit bf323db1d883c209880bd92f3b12503e3531c3fc
Fixed in 6.19-rc1 with commit 502ddcc405b69fa92e0add6c1714d654504f6fd7
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-68254
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/staging/rtl8723bs/core/rtw_mlme_ext.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/d1ab7f9cee22e7b8a528da9ac953e4193b96cda5
https://git.kernel.org/stable/c/38292407c2bb5b2b3131aaace4ecc7a829b40b76
https://git.kernel.org/stable/c/bf323db1d883c209880bd92f3b12503e3531c3fc
https://git.kernel.org/stable/c/502ddcc405b69fa92e0add6c1714d654504f6fd7
Powered by blists - more mailing lists