CVE-2025-53888

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-53888
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53888.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-53888
Aliases
  • GHSA-7972-w7f9-3j9m
Published
2025-07-18T16:15:29Z
Modified
2025-07-29T11:25:12.954582Z
Summary
[none]
Details

RIOT-OS, an operating system that supports Internet of Things devices, has an ineffective size check implemented with assert() can lead to buffer overflow in versions up to and including 2025.04. Assertions are usually compiled out in production builds. If assertions are the only defense against untrusted inputs, the software may be exposed to attacks that utilize the lack of proper input checks. In the l2filter_add() function shown below, addr_len is checked using an assertion and is subsequently used as an argument in a memcpy() call. When assertions are disabled, there would be no size check for addr_len. As a consequence, if an attacker were to provide an addr_len value larger than CONFIG_L2FILTER_ADDR_MAXLEN, they can trigger a buffer overflow and write past the list[i].addr buffer. If the unchecked input is attacker-controlled, the impact of the buffer overflow can range from a denial of service to arbitrary code execution. Commit f6f7de4ccc107c018630e4c15500825caf02e1c2 contains a patch for the vulnerability.

References

Affected packages

Git / github.com/riot-os/riot

Affected ranges

Type
GIT
Repo
https://github.com/riot-os/riot
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2013.*

2013.08

2014.*

2014.01
2014.05
2014.12

2015.*

2015.09-RC1
2015.12-RC1
2015.12-devel

2016.*

2016.03-devel
2016.04-RC1
2016.07-RC1
2016.07-RC2
2016.07-devel
2016.10-RC1
2016.10-devel

2017.*

2017.01-RC1
2017.01-devel
2017.04-RC1
2017.04-devel
2017.07-RC1
2017.07-devel
2017.10-RC1
2017.10-devel

2018.*

2018.01-RC1
2018.01-devel
2018.04-RC1
2018.04-devel
2018.07-RC1
2018.07-devel
2018.10-RC1
2018.10-devel

2019.*

2019.01-RC1
2019.01-devel
2019.04-RC1
2019.04-devel
2019.07-RC1
2019.07-devel
2019.10-RC1
2019.10-devel

2020.*

2020.01-RC1
2020.01-devel
2020.04-RC1
2020.04-devel
2020.07-RC1
2020.07-devel
2020.10-RC1
2020.10-devel

2021.*

2021.01-RC1
2021.01-devel
2021.04-RC1
2021.04-devel
2021.07-RC1
2021.07-devel
2021.10-RC1
2021.10-devel

2022.*

2022.01-RC1
2022.01-devel
2022.04-RC1
2022.04-devel
2022.07-RC1
2022.07-devel
2022.10-RC1
2022.10-devel

2023.*

2023.01-RC1
2023.01-devel
2023.04-RC1
2023.04-devel
2023.07-RC1
2023.07-devel
2023.10-RC1
2023.10-devel

2024.*

2024.01-RC1
2024.01-devel
2024.04
2024.04-RC1
2024.04-devel
2024.07-RC1
2024.07-devel
2024.10-RC1
2024.10-devel

2025.*

2025.01-RC1
2025.01-devel
2025.04-RC1
2025.04-devel
2025.07-devel