Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38348 – “Intersil p54 WiFi Interface Buffer Overflow Vulnerability”

    CVE-2025-38348 – “Intersil p54 WiFi Interface Buffer Overflow Vulnerability”

    July 10, 2025

    CVE ID : CVE-2025-38348

    Published : July 10, 2025, 9:15 a.m. | 4 hours, 51 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()

    Robert Morris reported:

    |If a malicious USB device pretends to be an Intersil p54 wifi
    |interface and generates an eeprom_readback message with a large
    |eeprom->v1.len, p54_rx_eeprom_readback() will copy data from the
    |message beyond the end of priv->eeprom.
    |
    |static void p54_rx_eeprom_readback(struct p54_common *priv,
    | struct sk_buff *skb)
    |{
    | struct p54_hdr *hdr = (struct p54_hdr *) skb->data;
    | struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr->data;
    |
    | if (priv->fw_var >= 0x509) {
    | memcpy(priv->eeprom, eeprom->v2.data,
    | le16_to_cpu(eeprom->v2.len));
    | } else {
    | memcpy(priv->eeprom, eeprom->v1.data,
    | le16_to_cpu(eeprom->v1.len));
    | }
    | […]

    The eeprom->v{1,2}.len is set by the driver in p54_download_eeprom().
    The device is supposed to provide the same length back to the driver.
    But yes, it’s possible (like shown in the report) to alter the value
    to something that causes a crash/panic due to overrun.

    This patch addresses the issue by adding the size to the common device
    context, so p54_rx_eeprom_readback no longer relies on possibly tampered
    values… That said, it also checks if the “firmware” altered the value
    and no longer copies them.

    The one, small saving grace is: Before the driver tries to read the eeprom,
    it needs to upload >a
    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38347 – F2FS Inline Data Corruption Denial of Service (DoS) Vulnerability
    Next Article CVE-2025-38342 – Linux Kernel Out-of-Bounds Vulnerability in software_node_get_reference_args

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-44658 – Netgear RAX30 PHP-FPM Misconfigured Extension Bypass Vulnerability

    July 22, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-7393 – Drupal Mail Login Authentication Bypass

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-24287 – Apache Directory Write Privilege Escalation

    Common Vulnerabilities and Exposures (CVEs)

    You only have a short time left to own the only official John Wick video game — soon it’ll be gone for good

    News & Updates

    Forget AirTag: This Bluetooth tracker is my top pick for both iPhone and Android users

    News & Updates

    Anthropic’s popular Claude Code AI tool now included in its $20/month Pro plan

    News & Updates

    Highlights

    Luckfox 15.6″ Portable Monitor Review

    July 3, 2025

    This is a review of the Luckfox 15.6″ Portable Monitor. It’s an IPS screen with…

    Rolex Datejust Super Clone Watches – Top Quality Replica for Sale – Thesuperclonewatches

    April 14, 2025

    The 4 types of people interested in AI agents – and what businesses can learn from them

    April 23, 2025

    CVE-2025-0926 – Axis Camera Station Pro File Deletion Privilege Escalation Vulnerability

    April 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.