Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-11 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before eb1e1526b82b8cf31f1ef9ca86a2647fb6cd89c6
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before 7c3e99fd4a66a5ac9c7dd32db07359666efe0002
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before a3b73c72c42348bf1555fd2b00f32f941324b242
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before 9530d666f4376c294cdf4348c29fe3542fec980a
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before 7c0884fcd2ddde0544d2e77f297ae461e1f53f58
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

6.6.103 (semver)
unaffected

6.12.43 (semver)
unaffected

6.15.11 (semver)
unaffected

6.16.2 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/eb1e1526b82b8cf31f1ef9ca86a2647fb6cd89c6

git.kernel.org/...c/7c3e99fd4a66a5ac9c7dd32db07359666efe0002

git.kernel.org/...c/a3b73c72c42348bf1555fd2b00f32f941324b242

git.kernel.org/...c/9530d666f4376c294cdf4348c29fe3542fec980a

git.kernel.org/...c/7c0884fcd2ddde0544d2e77f297ae461e1f53f58

cve.org (CVE-2025-39761)

nvd.nist.gov (CVE-2025-39761)

Download JSON