CVE-2024-57995

Source
https://cve.org/CVERecord?id=CVE-2024-57995
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57995.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57995
Downstream
Related
Published
2025-02-27T02:07:16.163Z
Modified
2026-03-20T12:41:05.455498Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix read pointer after free in ath12kmacassignvifto_vdev()

In ath12kmacassignviftovdev(), if arvif is created on a different radio, it gets deleted from that radio through a call to ath12kmacunassignlink_vif(). This action frees the arvif pointer. Subsequently, there is a check involving arvif, which will result in a read-after-free scenario.

Fix this by moving this check after arvif is again assigned via call to ath12kmacassignlinkvif().

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57995.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b5068bc9180d06a5ac242b0f9263047c14f86211
Fixed
57100b87c77818cb0d582a92e5cb32fff85c757d
Fixed
f3a95a312419e4f1e992525917da9dbcd247038f
Fixed
5a10971c7645a95f5d5dc23c26fbac4bf61801d0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57995.json"