CVE-2025-39761

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
11/09/2025
Last modified:
26/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath12k: Decrement TID on RX peer frag setup error handling<br /> <br /> Currently, TID is not decremented before peer cleanup, during error<br /> handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to<br /> out-of-bounds access in peer-&gt;rx_tid[].<br /> <br /> Hence, add a decrement operation for TID, before peer cleanup to<br /> ensures proper cleanup and prevents out-of-bounds access issues when<br /> the RX peer frag setup fails.<br /> <br /> Found during code review. Compile tested only.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.3 (including) 6.6.103 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.43 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.16 (including) 6.16.2 (excluding)