CVE-2025-68380

Source
https://cve.org/CVERecord?id=CVE-2025-68380
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68380.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68380
Downstream
Related
Published
2025-12-24T10:33:08.266Z
Modified
2026-03-20T12:46:24.364117Z
Summary
wifi: ath11k: fix peer HE MCS assignment
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix peer HE MCS assignment

In ath11kwmisendpeerassoc_cmd(), peer's transmit MCS is sent to firmware as receive MCS while peer's receive MCS sent as transmit MCS, which goes against firmwire's definition.

While connecting to a misbehaved AP that advertises 0xffff (meaning not supported) for 160 MHz transmit MCS map, firmware crashes due to 0xffff is assigned to hemcs->rxmcs_set field.

Ext Tag: HE Capabilities
    [...]
    Supported HE-MCS and NSS Set
    [...]
        Rx and Tx MCS Maps 160 MHz
        [...]
            Tx HE-MCS Map 160 MHz: 0xffff

Swap the assignment to fix this issue.

As the HE rate control mask is meant to limit our own transmit MCS, it needs to go via hemcs->rxmcs_set field. With the aforementioned swapping done, change is needed as well to apply it to the peer's receive MCS.

Tested-on: WCN6855 hw2.1 PCI WLAN.HSP.1.1-03125-QCAHSPSWPLV1V2SILICONZLITE-3.6510.41 Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68380.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
61fe43e7216df6e9a912d831aafc7142fa20f280
Fixed
92791290e4f6a1de25d35af792ab8918a70737f6
Fixed
4304bd7a334e981f189b9973056a58f84cc2b482
Fixed
097c870b91817779e5a312c6539099a884b1fe2b
Fixed
381096a417b7019896e93e86f4c585c592bf98e2
Fixed
6b1a0da75932353f66e710976ca85a7131f647ff
Fixed
4a013ca2d490c73c40588d62712ffaa432046a04

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68380.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.63
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.13
Type
ECOSYSTEM
Events
Introduced
6.18.0
Fixed
6.18.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68380.json"