{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T11:43:58.472","vulnerabilities":[{"cve":{"id":"CVE-2025-38657","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-08-22T16:15:40.777","lastModified":"2025-11-26T16:32:18.817","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: mcc: prevent shift wrapping in rtw89_core_mlsr_switch()\n\nThe \"link_id\" value comes from the user via debugfs.  If it's larger\nthan BITS_PER_LONG then that would result in shift wrapping and\npotentially an out of bounds access later.  In fact, we can limit it\nto IEEE80211_MLD_MAX_NUM_LINKS (15).\n\nFortunately, only root can write to debugfs files so the security\nimpact is minimal."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw89: mcc: impide el ajuste de turnos en rtw89_core_mlsr_switch(). El valor \"link_id\" proviene del usuario a través de debugfs. Si es mayor que BITS_PER_LONG, esto provocaría un ajuste de turnos y, potencialmente, un acceso fuera de los límites posteriormente. De hecho, podemos limitarlo a IEEE80211_MLD_MAX_NUM_LINKS (15). Afortunadamente, solo el usuario root puede escribir en archivos de debugfs, por lo que el impacto en la seguridad es mínimo."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.16:*:*:*:*:*:*:*","matchCriteriaId":"D6BFC4F7-7099-4420-AF39-DD1CEABB8DF9"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/417cfa9cc44fbe6bceab786f9a4ee5a210f1288e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/53cf488927a0f79968f9c03c4d1e00d2a79731c3","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}