Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-19 | Updated 2025-11-03 | Assigner Linux

Product status

Default status
unaffected

dd43f8f90206054e7da7593de0a334fb2cd0ea88 (git) before 8e751d46336205abc259ed3990e850a9843fb649
affected

c38c701851011c94ce3be1ccb3593678d2933fd8 (git) before e472f59d02c82b511bc43a3f96d62ed08bf4537f
affected

c38c701851011c94ce3be1ccb3593678d2933fd8 (git) before 31229145e6ba5ace3e9391113376fa05b7831ede
affected

c38c701851011c94ce3be1ccb3593678d2933fd8 (git) before 5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523
affected

c38c701851011c94ce3be1ccb3593678d2933fd8 (git) before 62b635dcd69c4fde7ce1de4992d71420a37e51e3
affected

bf3c348c5fdcf00a7eeed04a1b83e454d2dca2e5 (git)
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

6.1.151 (semver)
unaffected

6.6.105 (semver)
unaffected

6.12.46 (semver)
unaffected

6.16.6 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

lists.debian.org/debian-lts-announce/2025/10/msg00008.html

git.kernel.org/...c/8e751d46336205abc259ed3990e850a9843fb649

git.kernel.org/...c/e472f59d02c82b511bc43a3f96d62ed08bf4537f

git.kernel.org/...c/31229145e6ba5ace3e9391113376fa05b7831ede

git.kernel.org/...c/5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523

git.kernel.org/...c/62b635dcd69c4fde7ce1de4992d71420a37e51e3

cve.org (CVE-2025-39849)

nvd.nist.gov (CVE-2025-39849)

Download JSON