Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject VHT opmode for unsupported channel widths VHT operating mode notifications are not defined for channel widths below 20 MHz. In particular, 5 MHz and 10 MHz are not valid under the VHT specification and must be rejected. Without this check, malformed notifications using these widths may reach ieee80211_chan_width_to_rx_bw(), leading to a WARN_ON due to invalid input. This issue was reported by syzbot. Reject these unsupported widths early in sta_link_apply_parameters() when opmode_notif is used. The accepted set includes 20, 40, 80, 160, and 80+80 MHz, which are valid for VHT. While 320 MHz is not defined for VHT, it is allowed to avoid rejecting HE or EHT clients that may still send a VHT opmode notification.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-16 | Updated 2025-08-16 | Assigner Linux

Product status

Default status
unaffected

751e7489c1d74b94ffffbed619d8fd724eeff4ee before 18eca59a04500b68a90e0c5c873f97c9d1ea2bfa
affected

751e7489c1d74b94ffffbed619d8fd724eeff4ee before 58fcb1b4287ce38850402bb2bb16d09bf77b91d9
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.15.7
unaffected

6.16
unaffected

References

git.kernel.org/...c/18eca59a04500b68a90e0c5c873f97c9d1ea2bfa

git.kernel.org/...c/58fcb1b4287ce38850402bb2bb16d09bf77b91d9

cve.org (CVE-2025-38509)

nvd.nist.gov (CVE-2025-38509)

Download JSON