CVE-2025-38509
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's wifi mac80211 component improperly handling VHT (Very High Throughput) operating mode notifications for unsupported channel widths below 20 MHz, such as 5 MHz and 10 MHz. These widths are invalid under the VHT specification but were not being rejected early, allowing malformed notifications to reach a function that expects valid inputs, causing a warning or potential instability. The fix rejects these unsupported widths early to prevent invalid input processing.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause the Linux kernel's wifi subsystem to encounter warnings or instability due to processing invalid VHT operating mode notifications with unsupported channel widths. This could potentially lead to degraded wifi performance or system instability when handling malformed wifi frames.