CVE-2025-38294

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38294
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38294.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38294
Downstream
Published
2025-07-10T07:42:08Z
Modified
2025-10-16T01:55:13.142580Z
Summary
wifi: ath12k: fix NULL access in assign channel context handler
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix NULL access in assign channel context handler

Currently, when ath12kmacassignviftovdev() fails, the radio handle (ar) gets accessed from the link VIF handle (arvif) for debug logging, This is incorrect. In the fail scenario, radio handle is NULL. Fix the NULL access, avoid radio handle access by moving to the hardware debug logging helper function (ath12khw_warn).

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPLSILICONZ-1 Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPLV1.0V2.0SILICONZ-3

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
90570ba4610bdb1db39ef45f2b271a9f89680a9d
Fixed
3f919f76893069ec3c7475acaeb611eb31fca22d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
90570ba4610bdb1db39ef45f2b271a9f89680a9d
Fixed
ea24531d00f782f4e659e8c74578b7ac144720ca

Affected versions

v6.*

v6.12
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.15.1
v6.15.2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.15.3