Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2025-38406— wifi: ath6kl: remove WARN on bad firmware input

AI Predicted 5.3 Difficulty: Theoretical EPSS 0.05% · P16

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinuxbdcd81707973cf8aa9305337166f8ee842a050d4< 7a2afdc5af3b82b601f6a2f0d1c90d5f0bc27aebaffected
bdcd81707973cf8aa9305337166f8ee842a050d4< e6c49f0b203a987c306676d241066451b74db1a5affected
bdcd81707973cf8aa9305337166f8ee842a050d4< 46b47d4b06fa7f234d93f0f8ac43798feafcff89affected
bdcd81707973cf8aa9305337166f8ee842a050d4< 89bd133529a4d2d68287128b357e49adc00ec690affected
bdcd81707973cf8aa9305337166f8ee842a050d4< 347827bd0c5680dac2dd59674616840c4d5154f1affected
bdcd81707973cf8aa9305337166f8ee842a050d4< 327997afbb5e62532c28c1861ab5534c01969c9aaffected
bdcd81707973cf8aa9305337166f8ee842a050d4< 27d07deea35ae67f2e75913242e25bdb7e1114e5affected
bdcd81707973cf8aa9305337166f8ee842a050d4< e7417421d89358da071fd2930f91e67c7128fbffaffected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-38406

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
wifi: ath6kl: remove WARN on bad firmware input
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: remove WARN on bad firmware input If the firmware gives bad input, that's nothing to do with the driver's stack at this point etc., so the WARN_ON() doesn't add any value. Additionally, this is one of the top syzbot reports now. Just print a message, and as an added bonus, print the sizes too.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于ath6kl wifi驱动对错误固件输入的过度警告,可能导致系统日志污染。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux bdcd81707973cf8aa9305337166f8ee842a050d4 ~ 7a2afdc5af3b82b601f6a2f0d1c90d5f0bc27aeb -
LinuxLinux 3.2 -

II. Public POCs for CVE-2025-38406

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-38406

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-07-25 · 114 CVEs total

CVE-2025-38426drm/amdgpu: Add basic validation for RAS header
CVE-2025-38440net/mlx5e: Fix race between DIM disable and net_dim()
CVE-2025-38438ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak.
CVE-2025-38437ksmbd: fix potential use-after-free in oplock/lease break ack
CVE-2025-38436drm/scheduler: signal scheduled fence when kill job
CVE-2025-38435riscv: vector: Fix context save/restore with xtheadvector
CVE-2025-38434Revert "riscv: Define TASK_SIZE_MAX for __access_ok()"
CVE-2025-38433riscv: fix runtime constant support for nommu kernels
CVE-2025-38432net: netpoll: Initialize UDP checksum field before checksumming
CVE-2025-38431smb: client: fix regression with native SMB symlinks
CVE-2025-38430nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
CVE-2025-38429bus: mhi: ep: Update read pointer only after buffer is written
CVE-2025-38428Input: ims-pcu - check record size in ims_pcu_flash_firmware()
CVE-2025-38427video: screen_info: Relocate framebuffers behind PCI bridges
CVE-2025-38425i2c: tegra: check msg length in SMBUS block read
CVE-2025-38414wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850
CVE-2025-38417ice: fix eswitch code memory leak in reset scenario
CVE-2025-38416NFC: nci: uart: Set tty->disc_data only in success path
CVE-2025-38415Squashfs: check return result of sb_min_blocksize
CVE-2025-38418remoteproc: core: Release rproc->clean_table after rproc_attach() fails

Showing top 20 of 114 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-38406

No comments yet


Leave a comment