CVE-2025-38348

In the Linux kernel, the following vulnerability has been resolved: wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() Robert Morris reported: |If a malicious USB device pretends to be an Intersil p54 wifi |interface and generates an eeprom_readback message with a large |eeprom->v1.len, p54_rx_eeprom_readback() will copy data from the |message beyond the end of priv->eeprom. | |static void p54_rx_eeprom_readback(struct p54_common *priv, | struct sk_buff *skb) |{ | struct p54_hdr *hdr = (struct p54_hdr *) skb->data; | struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr->data; | | if (priv->fw_var >= 0x509) { | memcpy(priv->eeprom, eeprom->v2.data, | le16_to_cpu(eeprom->v2.len)); | } else { | memcpy(priv->eeprom, eeprom->v1.data, | le16_to_cpu(eeprom->v1.len)); | } | [...] The eeprom->v{1,2}.len is set by the driver in p54_download_eeprom(). The device is supposed to provide the same length back to the driver. But yes, it's possible (like shown in the report) to alter the value to something that causes a crash/panic due to overrun. This patch addresses the issue by adding the size to the common device context, so p54_rx_eeprom_readback no longer relies on possibly tampered values... That said, it also checks if the "firmware" altered the value and no longer copies them. The one, small saving grace is: Before the driver tries to read the eeprom, it needs to upload >a< firmware. the vendor firmware has a proprietary license and as a reason, it is not present on most distributions by default.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 17:35

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036 - () https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036 - Patch
References () https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422 - () https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422 - Patch
References () https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57 - () https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57 - Patch
References () https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb - () https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb - Patch
References () https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94 - () https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94 - Patch
References () https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d - () https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d - Patch
References () https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99 - () https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99 - Patch
References () https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802 - () https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: p54: evitar desbordamiento de búfer en p54_rx_eeprom_readback() Robert Morris informó: |Si un dispositivo USB malicioso se hace pasar por una interfaz wifi p54 de Intersil y genera un mensaje eeprom_readback con un eeprom-&gt;v1.len largo, p54_rx_eeprom_readback() copiará los datos del mensaje más allá del final de priv-&gt;eeprom. | |static void p54_rx_eeprom_readback(struct p54_common *priv, | struct sk_buff *skb) |{ | struct p54_hdr *hdr = (struct p54_hdr *) skb-&gt;data; | struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr-&gt;data; | | if (priv-&gt;fw_var &gt;= 0x509) { | memcpy(priv-&gt;eeprom, eeprom-&gt;v2.data, | le16_to_cpu(eeprom-&gt;v2.len)); | } else { | memcpy(priv-&gt;eeprom, eeprom-&gt;v1.data, | le16_to_cpu(eeprom-&gt;v1.len)); | } | [...] El controlador establece eeprom-&gt;v{1,2}.len en p54_download_eeprom(). Se supone que el dispositivo debe proporcionar la misma longitud al controlador. Sin embargo, es posible (como se muestra en el informe) modificar el valor para que provoque un bloqueo o pánico debido a un desbordamiento. Este parche soluciona el problema añadiendo el tamaño al contexto común del dispositivo, de modo que p54_rx_eeprom_readback ya no depende de valores posiblemente manipulados. Dicho esto, también comprueba si el firmware alteró el valor y ya no los copia. La única pequeña ventaja es que, antes de que el controlador intente leer la EEPROM, necesita cargar un firmware. El firmware del proveedor tiene una licencia propietaria y, por ello, no está presente en la mayoría de las distribuciones por defecto.
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

10 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 09:15

Updated : 2025-12-16 17:35


NVD link : CVE-2025-38348

Mitre link : CVE-2025-38348

CVE.ORG link : CVE-2025-38348


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write