๐Ÿ” CVE Alert

CVE-2024-57995

HIGH 7.8

wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() In ath12k_mac_assign_vif_to_vdev(), if arvif is created on a different radio, it gets deleted from that radio through a call to ath12k_mac_unassign_link_vif(). This action frees the arvif pointer. Subsequently, there is a check involving arvif, which will result in a read-after-free scenario. Fix this by moving this check after arvif is again assigned via call to ath12k_mac_assign_link_vif(). Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b5068bc9180d06a5ac242b0f9263047c14f86211 < 57100b87c77818cb0d582a92e5cb32fff85c757d b5068bc9180d06a5ac242b0f9263047c14f86211 < f3a95a312419e4f1e992525917da9dbcd247038f b5068bc9180d06a5ac242b0f9263047c14f86211 < 5a10971c7645a95f5d5dc23c26fbac4bf61801d0
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/57100b87c77818cb0d582a92e5cb32fff85c757d git.kernel.org: https://git.kernel.org/stable/c/f3a95a312419e4f1e992525917da9dbcd247038f git.kernel.org: https://git.kernel.org/stable/c/5a10971c7645a95f5d5dc23c26fbac4bf61801d0