In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix peer lookup in ath12kdpmonrxdeliver_msdu()
In ath12kdpmonrxdelivermsdu(), peer lookup fails because rxcb->peerid is not updated with a valid value. This is expected in monitor mode, where RX frames bypass the regular RX descriptor path that typically sets rxcb->peerid. As a result, the peer is NULL, and linkid and linkvalid fields in the RX status are not populated. This leads to a WARNON in mac80211 when it receives data frame from an associated station with invalid link_id.
Fix this potential issue by using ppduinfo->peer_id, which holds the correct peer id for the received frame. This ensures that the peer is correctly found and the associated link metadata is updated accordingly.
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40131.json"
}