๐Ÿ” CVE Alert

CVE-2025-38159

UNKNOWN 0.0

wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds Set the size to 6 instead of 2, since 'para' array is passed to 'rtw_fw_bt_wifi_control(rtwdev, para[0], &para[1])', which reads 5 bytes: void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data) { ... SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data); SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1)); ... SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4)); Detected using the static analysis tool - Svace.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 3, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4136214f7c46839c15f0f177fe1d5052302c0205 < 1ee8ea6937d13b20f90ff35d71ccc03ba448182d 4136214f7c46839c15f0f177fe1d5052302c0205 < 68a1037f0bac4de9a585aa9c879ef886109f3647 4136214f7c46839c15f0f177fe1d5052302c0205 < 74e18211c2c89ab66c9546baa7408288db61aa0d 4136214f7c46839c15f0f177fe1d5052302c0205 < c13255389499275bc5489a0b5b7940ccea3aef04 4136214f7c46839c15f0f177fe1d5052302c0205 < 9febcc8bded8be0d7efd8237fcef599b6d93b788 4136214f7c46839c15f0f177fe1d5052302c0205 < 4c2c372de2e108319236203cce6de44d70ae15cd
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1ee8ea6937d13b20f90ff35d71ccc03ba448182d git.kernel.org: https://git.kernel.org/stable/c/68a1037f0bac4de9a585aa9c879ef886109f3647 git.kernel.org: https://git.kernel.org/stable/c/74e18211c2c89ab66c9546baa7408288db61aa0d git.kernel.org: https://git.kernel.org/stable/c/c13255389499275bc5489a0b5b7940ccea3aef04 git.kernel.org: https://git.kernel.org/stable/c/9febcc8bded8be0d7efd8237fcef599b6d93b788 git.kernel.org: https://git.kernel.org/stable/c/4c2c372de2e108319236203cce6de44d70ae15cd lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html