{"id":"CVE-2025-68254","summary":"staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing\n\nThe Extended Supported Rates (ESR) IE handling in OnBeacon accessed\n*(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these\noffsets lie within the received frame buffer. A malformed beacon with\nan ESR IE positioned at the end of the buffer could cause an\nout-of-bounds read, potentially triggering a kernel panic.\n\nAdd a boundary check to ensure that the ESR IE body and the subsequent\nbytes are within the limits of the frame before attempting to access\nthem.\n\nThis prevents OOB reads caused by malformed beacon frames.","modified":"2026-04-02T13:03:28.153473Z","published":"2025-12-16T14:44:57.204Z","related":["SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2025:15836-1","openSUSE-SU-2026:10301-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68254.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/38292407c2bb5b2b3131aaace4ecc7a829b40b76"},{"type":"WEB","url":"https://git.kernel.org/stable/c/502ddcc405b69fa92e0add6c1714d654504f6fd7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb5940193d813449540d8d3a82abc045be41f48a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bf323db1d883c209880bd92f3b12503e3531c3fc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c03cb111628924827351e19baa5b073e9b0d723d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c173ce97d3f0f0c0fefa39139d6d04ba60b5db22"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d1ab7f9cee22e7b8a528da9ac953e4193b96cda5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68254.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68254"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"554c0a3abf216c991c5ebddcdb2c08689ecd290b"},{"fixed":"c03cb111628924827351e19baa5b073e9b0d723d"},{"fixed":"bb5940193d813449540d8d3a82abc045be41f48a"},{"fixed":"c173ce97d3f0f0c0fefa39139d6d04ba60b5db22"},{"fixed":"d1ab7f9cee22e7b8a528da9ac953e4193b96cda5"},{"fixed":"38292407c2bb5b2b3131aaace4ecc7a829b40b76"},{"fixed":"bf323db1d883c209880bd92f3b12503e3531c3fc"},{"fixed":"502ddcc405b69fa92e0add6c1714d654504f6fd7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68254.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.12.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.62"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.12"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.0"},{"fixed":"6.18.1"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68254.json"}}],"schema_version":"1.7.5"}