CVE-2025-38509

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/08/2025
Last modified:
19/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mac80211: reject VHT opmode for unsupported channel widths<br /> <br /> VHT operating mode notifications are not defined for channel widths<br /> below 20 MHz. In particular, 5 MHz and 10 MHz are not valid under the<br /> VHT specification and must be rejected.<br /> <br /> Without this check, malformed notifications using these widths may<br /> reach ieee80211_chan_width_to_rx_bw(), leading to a WARN_ON due to<br /> invalid input. This issue was reported by syzbot.<br /> <br /> Reject these unsupported widths early in sta_link_apply_parameters()<br /> when opmode_notif is used. The accepted set includes 20, 40, 80, 160,<br /> and 80+80 MHz, which are valid for VHT. While 320 MHz is not defined<br /> for VHT, it is allowed to avoid rejecting HE or EHT clients that may<br /> still send a VHT opmode notification.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*