Bug 2396928 (CVE-2025-39849) - CVE-2025-39849 kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()
Summary: CVE-2025-39849 kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_con...
Keywords:
Status: NEW
Alias: CVE-2025-39849
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-19 16:02 UTC by OSIDB Bzimport
Modified: 2025-11-19 12:27 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:18281 0 None None None 2025-10-20 02:00:45 UTC
Red Hat Product Errata RHSA-2025:19102 0 None None None 2025-10-27 09:38:21 UTC
Red Hat Product Errata RHSA-2025:19103 0 None None None 2025-10-27 09:35:51 UTC
Red Hat Product Errata RHSA-2025:19106 0 None None None 2025-10-27 18:31:41 UTC
Red Hat Product Errata RHSA-2025:21112 0 None None None 2025-11-12 11:25:20 UTC
Red Hat Product Errata RHSA-2025:21118 0 None None None 2025-11-12 12:22:18 UTC
Red Hat Product Errata RHSA-2025:21760 0 None None None 2025-11-19 12:27:27 UTC

Description OSIDB Bzimport 2025-09-19 16:02:12 UTC
In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()

If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would
lead to memory corruption so add some bounds checking.

Comment 4 errata-xmlrpc 2025-10-20 02:00:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:18281 https://access.redhat.com/errata/RHSA-2025:18281

Comment 5 errata-xmlrpc 2025-10-27 09:35:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:19103 https://access.redhat.com/errata/RHSA-2025:19103

Comment 6 errata-xmlrpc 2025-10-27 09:38:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:19102 https://access.redhat.com/errata/RHSA-2025:19102

Comment 7 errata-xmlrpc 2025-10-27 18:31:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:19106 https://access.redhat.com/errata/RHSA-2025:19106

Comment 8 errata-xmlrpc 2025-11-12 11:25:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:21112 https://access.redhat.com/errata/RHSA-2025:21112

Comment 9 errata-xmlrpc 2025-11-12 12:22:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:21118 https://access.redhat.com/errata/RHSA-2025:21118

Comment 11 errata-xmlrpc 2025-11-19 12:27:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:21760 https://access.redhat.com/errata/RHSA-2025:21760


Note You need to log in before you can comment on or make changes to this bug.