CVE-2024-57995
wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev()
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() In ath12k_mac_assign_vif_to_vdev(), if arvif is created on a different radio, it gets deleted from that radio through a call to ath12k_mac_unassign_link_vif(). This action frees the arvif pointer. Subsequently, there is a check involving arvif, which will result in a read-after-free scenario. Fix this by moving this check after arvif is again assigned via call to ath12k_mac_assign_link_vif(). Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
b5068bc9180d06a5ac242b0f9263047c14f86211 < 57100b87c77818cb0d582a92e5cb32fff85c757d b5068bc9180d06a5ac242b0f9263047c14f86211 < f3a95a312419e4f1e992525917da9dbcd247038f b5068bc9180d06a5ac242b0f9263047c14f86211 < 5a10971c7645a95f5d5dc23c26fbac4bf61801d0
Linux / Linux
6.10