CVE-2025-22128 (GCVE-0-2025-22128)
Vulnerability from cvelistv5
Published
2025-04-16 14:13
Modified
2025-06-27 10:21
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path If a shared IRQ is used by the driver due to platform limitation, then the IRQ affinity hint is set right after the allocation of IRQ vectors in ath12k_pci_msi_alloc(). This does no harm unless one of the functions requesting the IRQ fails and attempt to free the IRQ. This may end up with a warning from the IRQ core that is expecting the affinity hint to be cleared before freeing the IRQ: kernel/irq/manage.c: /* make sure affinity_hint is cleaned up */ if (WARN_ON_ONCE(desc->affinity_hint)) desc->affinity_hint = NULL; So to fix this issue, clear the IRQ affinity hint before calling ath12k_pci_free_irq() in the error path. The affinity will be cleared once again further down the error path due to code organization, but that does no harm.
Impacted products
Vendor Product Version
Linux Linux Version: a3012f206d07fa62b5c2e384cbc3a81a4dbba3c9
Version: a3012f206d07fa62b5c2e384cbc3a81a4dbba3c9
Version: a3012f206d07fa62b5c2e384cbc3a81a4dbba3c9
Create a notification for this product.
   Linux Linux Version: 6.8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/wireless/ath/ath12k/pci.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "a69a594794fcad96d4cfce12aab6c5014a12b4c8",
              "status": "affected",
              "version": "a3012f206d07fa62b5c2e384cbc3a81a4dbba3c9",
              "versionType": "git"
            },
            {
              "lessThan": "35b33ba76765ce9e72949d957f3cf1feafd2955c",
              "status": "affected",
              "version": "a3012f206d07fa62b5c2e384cbc3a81a4dbba3c9",
              "versionType": "git"
            },
            {
              "lessThan": "b43b1e2c52db77c872bd60d30cdcc72c47df70c7",
              "status": "affected",
              "version": "a3012f206d07fa62b5c2e384cbc3a81a4dbba3c9",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/wireless/ath/ath12k/pci.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.8"
            },
            {
              "lessThan": "6.8",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.35",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.14.*",
              "status": "unaffected",
              "version": "6.14.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.35",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14.2",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path\n\nIf a shared IRQ is used by the driver due to platform limitation, then the\nIRQ affinity hint is set right after the allocation of IRQ vectors in\nath12k_pci_msi_alloc(). This does no harm unless one of the functions\nrequesting the IRQ fails and attempt to free the IRQ.\n\nThis may end up with a warning from the IRQ core that is expecting the\naffinity hint to be cleared before freeing the IRQ:\n\nkernel/irq/manage.c:\n\n\t/* make sure affinity_hint is cleaned up */\n\tif (WARN_ON_ONCE(desc-\u003eaffinity_hint))\n\t\tdesc-\u003eaffinity_hint = NULL;\n\nSo to fix this issue, clear the IRQ affinity hint before calling\nath12k_pci_free_irq() in the error path. The affinity will be cleared once\nagain further down the error path due to code organization, but that does\nno harm."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-27T10:21:16.498Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/a69a594794fcad96d4cfce12aab6c5014a12b4c8"
        },
        {
          "url": "https://git.kernel.org/stable/c/35b33ba76765ce9e72949d957f3cf1feafd2955c"
        },
        {
          "url": "https://git.kernel.org/stable/c/b43b1e2c52db77c872bd60d30cdcc72c47df70c7"
        }
      ],
      "title": "wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-22128",
    "datePublished": "2025-04-16T14:13:10.692Z",
    "dateReserved": "2024-12-29T08:45:45.824Z",
    "dateUpdated": "2025-06-27T10:21:16.498Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-22128\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-04-16T15:16:06.897\",\"lastModified\":\"2025-06-27T11:15:24.440\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nwifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path\\n\\nIf a shared IRQ is used by the driver due to platform limitation, then the\\nIRQ affinity hint is set right after the allocation of IRQ vectors in\\nath12k_pci_msi_alloc(). This does no harm unless one of the functions\\nrequesting the IRQ fails and attempt to free the IRQ.\\n\\nThis may end up with a warning from the IRQ core that is expecting the\\naffinity hint to be cleared before freeing the IRQ:\\n\\nkernel/irq/manage.c:\\n\\n\\t/* make sure affinity_hint is cleaned up */\\n\\tif (WARN_ON_ONCE(desc-\u003eaffinity_hint))\\n\\t\\tdesc-\u003eaffinity_hint = NULL;\\n\\nSo to fix this issue, clear the IRQ affinity hint before calling\\nath12k_pci_free_irq() in the error path. The affinity will be cleared once\\nagain further down the error path due to code organization, but that does\\nno harm.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: Borrar la sugerencia de afinidad antes de llamar a ath12k_pci_free_irq() en la ruta de error Si el controlador usa una IRQ compartida debido a una limitaci\u00f3n de la plataforma, la sugerencia de afinidad de IRQ se establece justo despu\u00e9s de la asignaci\u00f3n de vectores de IRQ en ath12k_pci_msi_alloc(). Esto no causa da\u00f1o a menos que una de las funciones que solicita la IRQ falle e intente liberarla. Esto puede terminar con una advertencia del n\u00facleo de IRQ que espera que se borre la sugerencia de afinidad antes de liberar la IRQ: kernel/irq/manage.c: /* aseg\u00farese de que affinity_hint se limpie */ if (WARN_ON_ONCE(desc-\u0026gt;affinity_hint)) desc-\u0026gt;affinity_hint = NULL; Para solucionar este problema, borre la indicaci\u00f3n de afinidad de IRQ antes de llamar a ath12k_pci_free_irq() en la ruta de error. La afinidad se borrar\u00e1 m\u00e1s adelante en la ruta de error debido a la organizaci\u00f3n del c\u00f3digo, pero esto no perjudica.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/35b33ba76765ce9e72949d957f3cf1feafd2955c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a69a594794fcad96d4cfce12aab6c5014a12b4c8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b43b1e2c52db77c872bd60d30cdcc72c47df70c7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…