๐Ÿ” CVE Alert

CVE-2025-68255

UNKNOWN 0.0

staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing The Supported Rates IE length from an incoming Association Request frame was used directly as the memcpy() length when copying into a fixed-size 16-byte stack buffer (supportRate). A malicious station can advertise an IE length larger than 16 bytes, causing a stack buffer overflow. Clamp ie_len to the buffer size before copying the Supported Rates IE, and correct the bounds check when merging Extended Supported Rates to prevent a second potential overflow. This prevents kernel stack corruption triggered by malformed association requests.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
554c0a3abf216c991c5ebddcdb2c08689ecd290b < 49b7806851f93fd342838c93f4f765e0cc5029b0 554c0a3abf216c991c5ebddcdb2c08689ecd290b < 4445adedae770037078803d1ce41f9e88a1944b6 554c0a3abf216c991c5ebddcdb2c08689ecd290b < d129dc2a5d59b4d9cd2cc0b6eeb04df8461199f0 554c0a3abf216c991c5ebddcdb2c08689ecd290b < 34620eb602aa432f090b2b784ee5c5070fb16cf9 554c0a3abf216c991c5ebddcdb2c08689ecd290b < 61871c83259a511980ec2664964cecc69005398b 554c0a3abf216c991c5ebddcdb2c08689ecd290b < 25411f5fcf5743131158f337c99c2bbf3f8477f5 554c0a3abf216c991c5ebddcdb2c08689ecd290b < e841d8ea722315b781c4fc5bf4f7670fbca88875 554c0a3abf216c991c5ebddcdb2c08689ecd290b < 6ef0e1c10455927867cac8f0ed6b49f328f8cf95
Linux / Linux
4.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/49b7806851f93fd342838c93f4f765e0cc5029b0 git.kernel.org: https://git.kernel.org/stable/c/4445adedae770037078803d1ce41f9e88a1944b6 git.kernel.org: https://git.kernel.org/stable/c/d129dc2a5d59b4d9cd2cc0b6eeb04df8461199f0 git.kernel.org: https://git.kernel.org/stable/c/34620eb602aa432f090b2b784ee5c5070fb16cf9 git.kernel.org: https://git.kernel.org/stable/c/61871c83259a511980ec2664964cecc69005398b git.kernel.org: https://git.kernel.org/stable/c/25411f5fcf5743131158f337c99c2bbf3f8477f5 git.kernel.org: https://git.kernel.org/stable/c/e841d8ea722315b781c4fc5bf4f7670fbca88875 git.kernel.org: https://git.kernel.org/stable/c/6ef0e1c10455927867cac8f0ed6b49f328f8cf95