Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() In ath12k_dp_tx_get_encap_type(), the arvif parameter is only used to retrieve the ab pointer. In vdev delete sequence the arvif->ar could become NULL and that would trigger kernel panic. Since the caller ath12k_dp_tx() already has a valid ab pointer, pass it directly to avoid panic and unnecessary dereferencing. PC points to "ath12k_dp_tx+0x228/0x988 [ath12k]" LR points to "ath12k_dp_tx+0xc8/0x988 [ath12k]". The Backtrace obtained is as follows: ath12k_dp_tx+0x228/0x988 [ath12k] ath12k_mac_tx_check_max_limit+0x608/0x920 [ath12k] ieee80211_process_measurement_req+0x320/0x348 [mac80211] ieee80211_tx_dequeue+0x9ac/0x1518 [mac80211] ieee80211_tx_dequeue+0xb14/0x1518 [mac80211] ieee80211_tx_prepare_skb+0x224/0x254 [mac80211] ieee80211_xmit+0xec/0x100 [mac80211] __ieee80211_subif_start_xmit+0xc50/0xf40 [mac80211] ieee80211_subif_start_xmit+0x2e8/0x308 [mac80211] netdev_start_xmit+0x150/0x18c dev_hard_start_xmit+0x74/0xc0 Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

e93bbd65547ea8073b707c9034c3f051f8018614 before b508f370f88f277c95e2bd3bc47217a96d668cee
affected

e93bbd65547ea8073b707c9034c3f051f8018614 before ee4f8e7fa578f9f28cef5f409677db25f4f83d7e
affected

e93bbd65547ea8073b707c9034c3f051f8018614 before 05062834350f0bf7ad1abcebc2807220e90220eb
affected

Default status
affected

6.4
affected

Any version before 6.4
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/b508f370f88f277c95e2bd3bc47217a96d668cee

git.kernel.org/...c/ee4f8e7fa578f9f28cef5f409677db25f4f83d7e

git.kernel.org/...c/05062834350f0bf7ad1abcebc2807220e90220eb

cve.org (CVE-2025-38605)

nvd.nist.gov (CVE-2025-38605)

Download JSON