CVE-2025-38657

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: mcc: prevent shift wrapping in rtw89_core_mlsr_switch() The "link_id" value comes from the user via debugfs. If it's larger than BITS_PER_LONG then that would result in shift wrapping and potentially an out of bounds access later. In fact, we can limit it to IEEE80211_MLD_MAX_NUM_LINKS (15). Fortunately, only root can write to debugfs files so the security impact is minimal.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:6.16:*:*:*:*:*:*:*

History

26 Nov 2025, 16:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/417cfa9cc44fbe6bceab786f9a4ee5a210f1288e - () https://git.kernel.org/stable/c/417cfa9cc44fbe6bceab786f9a4ee5a210f1288e - Patch
References () https://git.kernel.org/stable/c/53cf488927a0f79968f9c03c4d1e00d2a79731c3 - () https://git.kernel.org/stable/c/53cf488927a0f79968f9c03c4d1e00d2a79731c3 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.16:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-125
First Time Linux linux Kernel
Linux

Information

Published : 2025-08-22 16:15

Updated : 2025-11-26 16:32


NVD link : CVE-2025-38657

Mitre link : CVE-2025-38657

CVE.ORG link : CVE-2025-38657


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read