Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-39849

Опубликовано: 19 сент. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.

Отчет

A bounds check was missing when copying the SSID IE in __cfg80211_connect_result(), allowing an over-length SSID element to overflow a fixed-size kernel buffer. A malicious AP or 802.11 frame injector in radio range could trigger kernel memory corruption during connection/auto-connect, leading to crash or potential code execution.

Меры по смягчению последствий

To mitigate this issue, prevent module cfg80211 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 10kernelFixedRHSA-2025:1910627.10.2025
Red Hat Enterprise Linux 10kernelFixedRHSA-2025:2111812.11.2025
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2025:1910327.10.2025
Red Hat Enterprise Linux 8kernelFixedRHSA-2025:1910227.10.2025
Red Hat Enterprise Linux 9kernelFixedRHSA-2025:1828120.10.2025
Red Hat Enterprise Linux 9kernelFixedRHSA-2025:2111212.11.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2396928kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()

EPSS

Процентиль: 4%
0.00018
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.

CVSS3: 7.8
nvd
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.

CVSS3: 5.5
msrc
7 месяцев назад

wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()

CVSS3: 7.8
debian
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 7.8
github
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.

EPSS

Процентиль: 4%
0.00018
Низкий

7.5 High

CVSS3