PT-2025-29070 · Intersil+7 · Intersil P54 Wifi Interface+7
Anubis
·
Published
2025-05-16
·
Updated
2026-03-25
·
CVE-2025-38348
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux kernel (affected versions not specified)
Description:
The Linux kernel contains a flaw in the p54 driver where a malicious USB device pretending to be an Intersil p54 wifi interface can cause a buffer overflow in the
p54 rx eeprom readback() function. This occurs when the device sends an eeprom readback message with a manipulated eeprom->v1.len value, leading to data being copied beyond the allocated buffer size in priv->eeprom. The function p54 rx eeprom readback() is vulnerable, specifically the memcpy operation that uses the length provided by the potentially compromised device.Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Memory Corruption
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Astra Linux
Debian
Intersil P54 Wifi Interface
Linuxmint
Linux Kernel
Red Os
Suse
Ubuntu