๐Ÿ” CVE Alert

CVE-2025-38509

UNKNOWN 0.0

wifi: mac80211: reject VHT opmode for unsupported channel widths

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject VHT opmode for unsupported channel widths VHT operating mode notifications are not defined for channel widths below 20 MHz. In particular, 5 MHz and 10 MHz are not valid under the VHT specification and must be rejected. Without this check, malformed notifications using these widths may reach ieee80211_chan_width_to_rx_bw(), leading to a WARN_ON due to invalid input. This issue was reported by syzbot. Reject these unsupported widths early in sta_link_apply_parameters() when opmode_notif is used. The accepted set includes 20, 40, 80, 160, and 80+80 MHz, which are valid for VHT. While 320 MHz is not defined for VHT, it is allowed to avoid rejecting HE or EHT clients that may still send a VHT opmode notification.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
751e7489c1d74b94ffffbed619d8fd724eeff4ee < 18eca59a04500b68a90e0c5c873f97c9d1ea2bfa 751e7489c1d74b94ffffbed619d8fd724eeff4ee < 58fcb1b4287ce38850402bb2bb16d09bf77b91d9
Linux / Linux
6.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/18eca59a04500b68a90e0c5c873f97c9d1ea2bfa git.kernel.org: https://git.kernel.org/stable/c/58fcb1b4287ce38850402bb2bb16d09bf77b91d9