CVE-2025-38509
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/08/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: mac80211: reject VHT opmode for unsupported channel widths<br />
<br />
VHT operating mode notifications are not defined for channel widths<br />
below 20 MHz. In particular, 5 MHz and 10 MHz are not valid under the<br />
VHT specification and must be rejected.<br />
<br />
Without this check, malformed notifications using these widths may<br />
reach ieee80211_chan_width_to_rx_bw(), leading to a WARN_ON due to<br />
invalid input. This issue was reported by syzbot.<br />
<br />
Reject these unsupported widths early in sta_link_apply_parameters()<br />
when opmode_notif is used. The accepted set includes 20, 40, 80, 160,<br />
and 80+80 MHz, which are valid for VHT. While 320 MHz is not defined<br />
for VHT, it is allowed to avoid rejecting HE or EHT clients that may<br />
still send a VHT opmode notification.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



