CVE-2025-38292
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
10/07/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath12k: fix invalid access to memory<br />
<br />
In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean<br />
is_continuation is part of rxcb.<br />
Currently, after freeing the skb, the rxcb->is_continuation accessed<br />
again which is wrong since the memory is already freed.<br />
This might lead use-after-free error.<br />
<br />
Hence, fix by locally defining bool is_continuation from rxcb,<br />
so that after freeing skb, is_continuation can be used.<br />
<br />
Compile tested only.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3 (including) | 6.12.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



