CVE-2025-68256
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2026-04-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser The Information Element (IE) parser rtw_get_ie() trusted the length byte of each IE without validating that the IE body (len bytes after the 2-byte header) fits inside the remaining frame buffer. A malformed frame can advertise an IE length larger than the available data, causing the parser to increment its pointer beyond the buffer end. This results in out-of-bounds reads or, depending on the pattern, an infinite loop. Fix by validating that (offset + 2 + len) does not exceed the limit before accepting the IE or advancing to the next element. This prevents OOB reads and ensures the parser terminates safely on malformed frames.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2026-04-18
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds (OOB) read in the Linux kernel's rtl8723bs staging driver, specifically in the Information Element (IE) parser function rtw_get_ie(). The parser trusted the length byte of each IE without verifying that the IE body actually fits within the remaining frame buffer. A malformed frame can specify an IE length larger than the available data, causing the parser to read beyond the buffer's end or potentially enter an infinite loop. The fix involves validating that the total length does not exceed the buffer limit before processing the IE.


How can this vulnerability impact me? :

This vulnerability can lead to out-of-bounds memory reads or infinite loops when processing malformed frames. Such behavior can cause system instability, crashes, or potentially expose sensitive memory contents, which may be exploited by attackers to compromise system security or cause denial of service.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch or update to the fixed version of the Linux kernel that includes the correction for the rtl8723bs IE parser to prevent out-of-bounds reads. This fix validates the IE length before parsing to avoid malformed frames causing issues.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart