CVE-2025-38157

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Abort software beacon handling if disabled A malicious USB device can send a WMI_SWBA_EVENTID event from an ath9k_htc-managed device before beaconing has been enabled. This causes a device-by-zero error in the driver, leading to either a crash or an out of bounds read. Prevent this by aborting the handling in ath9k_htc_swba() if beacons are not enabled.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

18 Dec 2025, 21:09

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc - () https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc - Patch
References () https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0 - () https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0 - Patch
References () https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e - () https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e - Patch
References () https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46 - () https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46 - Patch
References () https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605 - () https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605 - Patch
References () https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c - () https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c - Patch
References () https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54 - () https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54 - Patch
References () https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a - () https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

03 Jul 2025, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath9k_htc: Cancelar la gestión de balizas de software si está deshabilitada. Un dispositivo USB malicioso puede enviar un evento WMI_SWBA_EVENTID desde un dispositivo administrado por ath9k_htc antes de que se haya habilitado la baliza. Esto provoca un error de dispositivo por cero en el controlador, lo que provoca un bloqueo o una lectura fuera de los límites. Para evitarlo, cancele la gestión en ath9k_htc_swba() si las balizas no están habilitadas.

03 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-03 09:15

Updated : 2025-12-18 21:09


NVD link : CVE-2025-38157

Mitre link : CVE-2025-38157

CVE.ORG link : CVE-2025-38157


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write