Description
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.
Product status
dd43f8f90206054e7da7593de0a334fb2cd0ea88 (git) before 8e751d46336205abc259ed3990e850a9843fb649
c38c701851011c94ce3be1ccb3593678d2933fd8 (git) before e472f59d02c82b511bc43a3f96d62ed08bf4537f
c38c701851011c94ce3be1ccb3593678d2933fd8 (git) before 31229145e6ba5ace3e9391113376fa05b7831ede
c38c701851011c94ce3be1ccb3593678d2933fd8 (git) before 5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523
c38c701851011c94ce3be1ccb3593678d2933fd8 (git) before 62b635dcd69c4fde7ce1de4992d71420a37e51e3
bf3c348c5fdcf00a7eeed04a1b83e454d2dca2e5 (git)
6.3
Any version before 6.3
6.1.151 (semver)
6.6.105 (semver)
6.12.46 (semver)
6.16.6 (semver)
6.17 (original_commit_for_fix)
References
lists.debian.org/debian-lts-announce/2025/10/msg00008.html
git.kernel.org/...c/8e751d46336205abc259ed3990e850a9843fb649
git.kernel.org/...c/e472f59d02c82b511bc43a3f96d62ed08bf4537f
git.kernel.org/...c/31229145e6ba5ace3e9391113376fa05b7831ede
git.kernel.org/...c/5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523
git.kernel.org/...c/62b635dcd69c4fde7ce1de4992d71420a37e51e3