In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi
In certain cases, hardware might provide packets with a
length greater than the maximum native Wi-Fi header length.
This can lead to accessing and modifying fields in the header
within the ath12k_dp_rx_h_undecap_nwifi function for
DP_RX_DECAP_TYPE_NATIVE_WIFI decap type and
potentially resulting in invalid data access and memory corruption.
Add a sanity check before processing the SKB to prevent invalid
data access in the undecap native Wi-Fi function for the
DP_RX_DECAP_TYPE_NATIVE_WIFI decap type.
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
References
Configurations
Configuration 1 (hide)
|
History
17 Nov 2025, 12:57
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://git.kernel.org/stable/c/3abe15e756481c45f6acba3d476cb3ca4afc3b61 - Patch | |
| References | () https://git.kernel.org/stable/c/50be1fb76556e80af9f5da80f28168b6c71bce58 - Patch | |
| References | () https://git.kernel.org/stable/c/6ee653194ddb83674913fd2727b8ecfae0597ade - Patch | |
| References | () https://git.kernel.org/stable/c/7f1d986da5c6abb75ffe4d0d325fc9b341c41a1c - Patch | |
| References | () https://git.kernel.org/stable/c/9a0dddfb30f120db3851627935851d262e4e7acb - Patch |
Information
Published : 2025-05-20 16:15
Updated : 2025-11-17 12:57
NVD link : CVE-2025-37943
Mitre link : CVE-2025-37943
CVE.ORG link : CVE-2025-37943
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
