CVE-2025-68729
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath12k: Fix MSDU buffer types handling in RX error path<br />
<br />
Currently, packets received on the REO exception ring from<br />
unassociated peers are of MSDU buffer type, while the driver expects<br />
link descriptor type packets. These packets are not parsed further due<br />
to a return check on packet type in ath12k_hal_desc_reo_parse_err(),<br />
but the associated skb is not freed. This may lead to kernel<br />
crashes and buffer leaks.<br />
<br />
Hence to fix, update the RX error handler to explicitly drop<br />
MSDU buffer type packets received on the REO exception ring.<br />
This prevents further processing of invalid packets and ensures<br />
stability in the RX error handling path.<br />
<br />
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1



