-

CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Decrement TID on RX peer frag setup error handling

Currently, TID is not decremented before peer cleanup, during error
handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to
out-of-bounds access in peer->rx_tid[].

Hence, add a decrement operation for TID, before peer cleanup to
ensures proper cleanup and prevents out-of-bounds access issues when
the RX peer frag setup fails.

Found during code review. Compile tested only.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < eb1e1526b82b8cf31f1ef9ca86a2647fb6cd89c6
Version d889913205cf7ebda905b1e62c5867ed4e39f6c2
Status affected
Version < 7c3e99fd4a66a5ac9c7dd32db07359666efe0002
Version d889913205cf7ebda905b1e62c5867ed4e39f6c2
Status affected
Version < a3b73c72c42348bf1555fd2b00f32f941324b242
Version d889913205cf7ebda905b1e62c5867ed4e39f6c2
Status affected
Version < 9530d666f4376c294cdf4348c29fe3542fec980a
Version d889913205cf7ebda905b1e62c5867ed4e39f6c2
Status affected
Version < 7c0884fcd2ddde0544d2e77f297ae461e1f53f58
Version d889913205cf7ebda905b1e62c5867ed4e39f6c2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.3
Status affected
Version < 6.3
Version 0
Status unaffected
Version <= 6.6.*
Version 6.6.103
Status unaffected
Version <= 6.12.*
Version 6.12.43
Status unaffected
Version <= 6.15.*
Version 6.15.11
Status unaffected
Version <= 6.16.*
Version 6.16.2
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.047
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string