In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025091904-CVE-2025-39849-c414@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:18281 https://access.redhat.com/errata/RHSA-2025:18281
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:19103 https://access.redhat.com/errata/RHSA-2025:19103
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:19102 https://access.redhat.com/errata/RHSA-2025:19102
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:19106 https://access.redhat.com/errata/RHSA-2025:19106
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:21112 https://access.redhat.com/errata/RHSA-2025:21112
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:21118 https://access.redhat.com/errata/RHSA-2025:21118
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:21760 https://access.redhat.com/errata/RHSA-2025:21760