๐Ÿ” CVE Alert

CVE-2025-38294

UNKNOWN 0.0

wifi: ath12k: fix NULL access in assign channel context handler

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix NULL access in assign channel context handler Currently, when ath12k_mac_assign_vif_to_vdev() fails, the radio handle (ar) gets accessed from the link VIF handle (arvif) for debug logging, This is incorrect. In the fail scenario, radio handle is NULL. Fix the NULL access, avoid radio handle access by moving to the hardware debug logging helper function (ath12k_hw_warn). Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1 Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 10, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
90570ba4610bdb1db39ef45f2b271a9f89680a9d < 3f919f76893069ec3c7475acaeb611eb31fca22d 90570ba4610bdb1db39ef45f2b271a9f89680a9d < ea24531d00f782f4e659e8c74578b7ac144720ca
Linux / Linux
6.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3f919f76893069ec3c7475acaeb611eb31fca22d git.kernel.org: https://git.kernel.org/stable/c/ea24531d00f782f4e659e8c74578b7ac144720ca