We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi In certain cases, hardware might provide packets with a length greater than the maximum native Wi-Fi header length. This can lead to accessing and modifying fields in the header within the ath12k_dp_rx_h_undecap_nwifi function for DP_RX_DECAP_TYPE_NATIVE_WIFI decap type and potentially resulting in invalid data access and memory corruption. Add a sanity check before processing the SKB to prevent invalid data access in the undecap native Wi-Fi function for the DP_RX_DECAP_TYPE_NATIVE_WIFI decap type. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/7f1d986da5c6abb75ffe4d0d325fc9b341c41a1c
git.kernel.org/...c/3abe15e756481c45f6acba3d476cb3ca4afc3b61
git.kernel.org/...c/6ee653194ddb83674913fd2727b8ecfae0597ade
git.kernel.org/...c/50be1fb76556e80af9f5da80f28168b6c71bce58
git.kernel.org/...c/9a0dddfb30f120db3851627935851d262e4e7acb
Support options