CVE-2025-68729
Unknown Unknown - Not Provided
Use-After-Free in Linux ath12k Driver Causes Kernel Crashes

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix MSDU buffer types handling in RX error path Currently, packets received on the REO exception ring from unassociated peers are of MSDU buffer type, while the driver expects link descriptor type packets. These packets are not parsed further due to a return check on packet type in ath12k_hal_desc_reo_parse_err(), but the associated skb is not freed. This may lead to kernel crashes and buffer leaks. Hence to fix, update the RX error handler to explicitly drop MSDU buffer type packets received on the REO exception ring. This prevents further processing of invalid packets and ensures stability in the RX error handling path. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-06
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux kernel *
qualcomm qcn9274 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel's ath12k WiFi driver where packets received on the REO exception ring from unassociated peers are of an unexpected MSDU buffer type instead of the expected link descriptor type. Because the driver does not free the associated socket buffer (skb) for these packets due to a return check, it can lead to kernel crashes and buffer leaks. The fix involves updating the RX error handler to explicitly drop these MSDU buffer type packets to prevent further processing and ensure system stability.


How can this vulnerability impact me? :

This vulnerability can cause kernel crashes and buffer leaks in systems using the affected Linux kernel WiFi driver. Such instability can lead to system downtime, degraded performance, or potential denial of service due to resource exhaustion.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the ath12k driver, which explicitly drops MSDU buffer type packets received on the REO exception ring. This prevents kernel crashes and buffer leaks by ensuring proper handling of RX error packets.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart