CVE-2025-39952
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
04/10/2025
Last modified:
23/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: wilc1000: avoid buffer overflow in WID string configuration<br />
<br />
Fix the following copy overflow warning identified by Smatch checker.<br />
<br />
drivers/net/wireless/microchip/wilc1000/wlan_cfg.c:184 wilc_wlan_parse_response_frame()<br />
error: &#39;__memcpy()&#39; &#39;cfg->s[i]->str&#39; copy overflow (512 vs 65537)<br />
<br />
This patch introduces size check before accessing the memory buffer.<br />
The checks are base on the WID type of received data from the firmware.<br />
For WID string configuration, the size limit is determined by individual<br />
element size in &#39;struct wilc_cfg_str_vals&#39; that is maintained in &#39;len&#39; field<br />
of &#39;struct wilc_cfg_str&#39;.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.2 (including) | 6.6.108 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.49 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



