๐Ÿ” CVE Alert

CVE-2025-68729

UNKNOWN 0.0

wifi: ath12k: Fix MSDU buffer types handling in RX error path

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix MSDU buffer types handling in RX error path Currently, packets received on the REO exception ring from unassociated peers are of MSDU buffer type, while the driver expects link descriptor type packets. These packets are not parsed further due to a return check on packet type in ath12k_hal_desc_reo_parse_err(), but the associated skb is not freed. This may lead to kernel crashes and buffer leaks. Hence to fix, update the RX error handler to explicitly drop MSDU buffer type packets received on the REO exception ring. This prevents further processing of invalid packets and ensures stability in the RX error handling path. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d889913205cf7ebda905b1e62c5867ed4e39f6c2 < 5ff5a9d71cdc49c3400f30583a784ad0a17d01ec d889913205cf7ebda905b1e62c5867ed4e39f6c2 < ab0554f51e5f2b9506e8a09e8accd02f00056729 d889913205cf7ebda905b1e62c5867ed4e39f6c2 < 36f9edbb9d0fc36c865c74f3c1ad8e1261ad3981
Linux / Linux
6.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5ff5a9d71cdc49c3400f30583a784ad0a17d01ec git.kernel.org: https://git.kernel.org/stable/c/ab0554f51e5f2b9506e8a09e8accd02f00056729 git.kernel.org: https://git.kernel.org/stable/c/36f9edbb9d0fc36c865c74f3c1ad8e1261ad3981