### [CVE-2025-39849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39849) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=bf3c348c5fdcf00a7eeed04a1b83e454d2dca2e5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=c38c701851011c94ce3be1ccb3593678d2933fd8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=dd43f8f90206054e7da7593de0a334fb2cd0ea88%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it wouldlead to memory corruption so add some bounds checking. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security