In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: mcc: prevent shift wrapping in rtw89_core_mlsr_switch()
The "link_id" value comes from the user via debugfs. If it's larger
than BITS_PER_LONG then that would result in shift wrapping and
potentially an out of bounds access later. In fact, we can limit it
to IEEE80211_MLD_MAX_NUM_LINKS (15).
Fortunately, only root can write to debugfs files so the security
impact is minimal.
References
Configurations
History
26 Nov 2025, 16:32
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/417cfa9cc44fbe6bceab786f9a4ee5a210f1288e - Patch | |
| References | () https://git.kernel.org/stable/c/53cf488927a0f79968f9c03c4d1e00d2a79731c3 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| CWE | CWE-125 | |
| First Time |
Linux linux Kernel
Linux |
Information
Published : 2025-08-22 16:15
Updated : 2025-11-26 16:32
NVD link : CVE-2025-38657
Mitre link : CVE-2025-38657
CVE.ORG link : CVE-2025-38657
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
