In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
Set the size to 6 instead of 2, since 'para' array is passed to 'rtwfwbtwificontrol(rtwdev, para[0], ¶[1])', which reads 5 bytes:
void rtwfwbtwificontrol(struct rtwdev *rtwdev, u8 opcode, u8 *data) { ... SETBTWIFICONTROLDATA1(h2cpkt, *data); SETBTWIFICONTROLDATA2(h2cpkt, *(data + 1)); ... SETBTWIFICONTROLDATA5(h2c_pkt, *(data + 4));
Detected using the static analysis tool - Svace.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38159.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38159.json"
[
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c13255389499275bc5489a0b5b7940ccea3aef04",
"id": "CVE-2025-38159-ec9c8951",
"deprecated": false,
"target": {
"function": "rtw_coex_tdma_timer_base",
"file": "drivers/net/wireless/realtek/rtw88/coex.c"
},
"signature_version": "v1",
"digest": {
"length": 1044.0,
"function_hash": "126432150592057079923177546310135482095"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c13255389499275bc5489a0b5b7940ccea3aef04",
"id": "CVE-2025-38159-f45b340d",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/realtek/rtw88/coex.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"65421175389187879516088040599504294877",
"134737845149619241529691204131280044409",
"263380960775167736254072822486977042704",
"78228434777275118255914923908176393090"
],
"threshold": 0.9
}
}
]