Wind River Support Network

HomeDefectsLIN1024-12678
Fixed

LIN1024-12678 : Security Advisory - linux - CVE-2025-39952

Created: Oct 10, 2025    Updated: Oct 22, 2025
Resolved Date: Oct 22, 2025
Found In Version: 10.24.33.1
Fix Version: 10.24.33.13
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]wifi: wilc1000: avoid buffer overflow in WID string configuration[EOL][EOL]Fix the following copy overflow warning identified by Smatch checker.[EOL][EOL] drivers/net/wireless/microchip/wilc1000/wlan_cfg.c:184 wilc_wlan_parse_response_frame()[EOL]        error: '__memcpy()' 'cfg->s[i]->str' copy overflow (512 vs 65537)[EOL][EOL]This patch introduces size check before accessing the memory buffer.[EOL]The checks are base on the WID type of received data from the firmware.[EOL]For WID string configuration, the size limit is determined by individual[EOL]element size in 'struct wilc_cfg_str_vals' that is maintained in 'len' field[EOL]of 'struct wilc_cfg_str'.

CVEs


Live chat
Online