In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix peer lookup in ath12kdpmonrxdelivermsdu() In ath12kdpmonrxdelivermsdu(), peer lookup fails because rxcb->peerid is not updated with a valid value. This is expected in monitor mode, where RX frames bypass the regular RX descriptor path that typically sets rxcb->peerid. As a result, the peer is NULL, and linkid and linkvalid fields in the RX status are not populated. This leads to a WARNON in mac80211 when it receives data frame from an associated station with invalid linkid. Fix this potential issue by using ppduinfo->peerid, which holds the correct peer id for the received frame. This ensures that the peer is correctly found and the associated link metadata is updated accordingly. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPLSILICONZ-1