CVE-2025-40131
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
12/11/2025
Última modificación:
12/11/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()<br />
<br />
In ath12k_dp_mon_rx_deliver_msdu(), peer lookup fails because<br />
rxcb->peer_id is not updated with a valid value. This is expected<br />
in monitor mode, where RX frames bypass the regular RX<br />
descriptor path that typically sets rxcb->peer_id.<br />
As a result, the peer is NULL, and link_id and link_valid fields<br />
in the RX status are not populated. This leads to a WARN_ON in<br />
mac80211 when it receives data frame from an associated station<br />
with invalid link_id.<br />
<br />
Fix this potential issue by using ppduinfo->peer_id, which holds<br />
the correct peer id for the received frame. This ensures that the<br />
peer is correctly found and the associated link metadata is updated<br />
accordingly.<br />
<br />
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1



