Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2025-68729

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath12k: Fix MSDU buffer types handling in RX error path<br /> <br /> Currently, packets received on the REO exception ring from<br /> unassociated peers are of MSDU buffer type, while the driver expects<br /> link descriptor type packets. These packets are not parsed further due<br /> to a return check on packet type in ath12k_hal_desc_reo_parse_err(),<br /> but the associated skb is not freed. This may lead to kernel<br /> crashes and buffer leaks.<br /> <br /> Hence to fix, update the RX error handler to explicitly drop<br /> MSDU buffer type packets received on the REO exception ring.<br /> This prevents further processing of invalid packets and ensures<br /> stability in the RX error handling path.<br /> <br /> Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1

Impacto