-
CVE-2025-38509
- EPSS 0.03%
- Published 16.08.2025 10:54:46
- Last modified 18.08.2025 20:16:28
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject VHT opmode for unsupported channel widths VHT operating mode notifications are not defined for channel widths below 20 MHz. In particular, 5 MHz and 10 MHz are not valid under the VHT specification and must be rejected. Without this check, malformed notifications using these widths may reach ieee80211_chan_width_to_rx_bw(), leading to a WARN_ON due to invalid input. This issue was reported by syzbot. Reject these unsupported widths early in sta_link_apply_parameters() when opmode_notif is used. The accepted set includes 20, 40, 80, 160, and 80+80 MHz, which are valid for VHT. While 320 MHz is not defined for VHT, it is allowed to avoid rejecting HE or EHT clients that may still send a VHT opmode notification.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
18eca59a04500b68a90e0c5c873f97c9d1ea2bfa
Version
751e7489c1d74b94ffffbed619d8fd724eeff4ee
Status
affected
Version <
58fcb1b4287ce38850402bb2bb16d09bf77b91d9
Version
751e7489c1d74b94ffffbed619d8fd724eeff4ee
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.13
Status
affected
Version <
6.13
Version
0
Status
unaffected
Version <=
6.15.*
Version
6.15.7
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.057 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|