CVE-2025-22128: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path If a shared IRQ is used by the driver due to platform limitation, then the IRQ affinity hint is set right after the allocation of IRQ vectors in ath12k_pci_msi_alloc(). This does no harm unless one of the functions requesting the IRQ fails and attempt to free the IRQ. This may end up with a warning from the IRQ core that is expecting the affinity hint to be cleared before freeing the IRQ: kernel/irq/manage.c: /* make sure affinity_hint is cleaned up */ if (WARN_ON_ONCE(desc->affinity_hint)) desc->affinity_hint = NULL; So to fix this issue, clear the IRQ affinity hint before calling ath12k_pci_free_irq() in the error path. The affinity will be cleared once again further down the error path due to code organization, but that does no harm.
AI Analysis
Technical Summary
CVE-2025-22128 is a vulnerability identified in the Linux kernel specifically affecting the ath12k wireless driver, which manages certain Qualcomm Atheros Wi-Fi chipsets. The issue arises in the handling of IRQ (Interrupt Request) affinity hints during error paths when freeing IRQs. In systems where the driver uses a shared IRQ due to platform limitations, the IRQ affinity hint is set immediately after IRQ vector allocation in the function ath12k_pci_msi_alloc(). However, if a subsequent function requesting the IRQ fails and attempts to free the IRQ, the affinity hint is not cleared before calling ath12k_pci_free_irq(). This leads to a warning from the Linux kernel's IRQ core subsystem, which expects the affinity hint to be cleared before freeing the IRQ. The warning is triggered by a kernel check that flags the presence of a non-null affinity hint during IRQ freeing, indicating improper cleanup. The fix involves explicitly clearing the IRQ affinity hint before invoking ath12k_pci_free_irq() in the error path, ensuring proper resource cleanup and preventing kernel warnings. Although the affinity hint is cleared again later in the error path, the early clearing is necessary to avoid the warning and potential instability. This vulnerability does not appear to cause direct memory corruption or privilege escalation but may lead to kernel warnings and potential instability in the IRQ handling subsystem of affected Linux systems using the ath12k driver. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-22128 is primarily related to system stability and reliability rather than direct security breaches. Organizations relying on Linux systems with Qualcomm Atheros ath12k Wi-Fi chipsets—common in many laptops, embedded devices, and network equipment—may experience kernel warnings or instability during error conditions involving IRQ handling. This could lead to unexpected system behavior, degraded network performance, or in rare cases, system crashes if the IRQ subsystem is compromised. While the vulnerability does not directly expose systems to remote code execution or privilege escalation, the resulting instability could disrupt critical services, especially in environments where wireless connectivity is essential. For sectors such as telecommunications, manufacturing, and critical infrastructure in Europe, where Linux-based embedded systems are prevalent, this could translate into operational disruptions. However, the absence of known exploits and the nature of the issue suggest a low immediate risk of targeted attacks. Nonetheless, maintaining kernel stability is crucial for compliance with operational security standards and ensuring uninterrupted service delivery.
Mitigation Recommendations
To mitigate CVE-2025-22128, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing the IRQ affinity hint clearing in the ath12k driver error path. This is the definitive fix and prevents the kernel warnings and potential instability. 2) Identify and inventory systems using the ath12k driver, focusing on devices with Qualcomm Atheros Wi-Fi chipsets, to prioritize patching efforts. 3) For embedded or specialized devices where kernel updates are not immediately feasible, consider disabling or limiting the use of affected wireless interfaces temporarily to reduce exposure to IRQ handling errors. 4) Monitor kernel logs for IRQ core warnings related to affinity hints, which can indicate the presence of this issue and help in early detection. 5) Engage with hardware vendors and Linux distribution maintainers to ensure timely delivery of patches and updates. 6) Implement robust system monitoring and alerting to detect any instability or crashes potentially linked to IRQ handling issues. These steps go beyond generic advice by focusing on targeted patching, device inventory, and proactive monitoring specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-22128: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path If a shared IRQ is used by the driver due to platform limitation, then the IRQ affinity hint is set right after the allocation of IRQ vectors in ath12k_pci_msi_alloc(). This does no harm unless one of the functions requesting the IRQ fails and attempt to free the IRQ. This may end up with a warning from the IRQ core that is expecting the affinity hint to be cleared before freeing the IRQ: kernel/irq/manage.c: /* make sure affinity_hint is cleaned up */ if (WARN_ON_ONCE(desc->affinity_hint)) desc->affinity_hint = NULL; So to fix this issue, clear the IRQ affinity hint before calling ath12k_pci_free_irq() in the error path. The affinity will be cleared once again further down the error path due to code organization, but that does no harm.
AI-Powered Analysis
Technical Analysis
CVE-2025-22128 is a vulnerability identified in the Linux kernel specifically affecting the ath12k wireless driver, which manages certain Qualcomm Atheros Wi-Fi chipsets. The issue arises in the handling of IRQ (Interrupt Request) affinity hints during error paths when freeing IRQs. In systems where the driver uses a shared IRQ due to platform limitations, the IRQ affinity hint is set immediately after IRQ vector allocation in the function ath12k_pci_msi_alloc(). However, if a subsequent function requesting the IRQ fails and attempts to free the IRQ, the affinity hint is not cleared before calling ath12k_pci_free_irq(). This leads to a warning from the Linux kernel's IRQ core subsystem, which expects the affinity hint to be cleared before freeing the IRQ. The warning is triggered by a kernel check that flags the presence of a non-null affinity hint during IRQ freeing, indicating improper cleanup. The fix involves explicitly clearing the IRQ affinity hint before invoking ath12k_pci_free_irq() in the error path, ensuring proper resource cleanup and preventing kernel warnings. Although the affinity hint is cleared again later in the error path, the early clearing is necessary to avoid the warning and potential instability. This vulnerability does not appear to cause direct memory corruption or privilege escalation but may lead to kernel warnings and potential instability in the IRQ handling subsystem of affected Linux systems using the ath12k driver. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-22128 is primarily related to system stability and reliability rather than direct security breaches. Organizations relying on Linux systems with Qualcomm Atheros ath12k Wi-Fi chipsets—common in many laptops, embedded devices, and network equipment—may experience kernel warnings or instability during error conditions involving IRQ handling. This could lead to unexpected system behavior, degraded network performance, or in rare cases, system crashes if the IRQ subsystem is compromised. While the vulnerability does not directly expose systems to remote code execution or privilege escalation, the resulting instability could disrupt critical services, especially in environments where wireless connectivity is essential. For sectors such as telecommunications, manufacturing, and critical infrastructure in Europe, where Linux-based embedded systems are prevalent, this could translate into operational disruptions. However, the absence of known exploits and the nature of the issue suggest a low immediate risk of targeted attacks. Nonetheless, maintaining kernel stability is crucial for compliance with operational security standards and ensuring uninterrupted service delivery.
Mitigation Recommendations
To mitigate CVE-2025-22128, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing the IRQ affinity hint clearing in the ath12k driver error path. This is the definitive fix and prevents the kernel warnings and potential instability. 2) Identify and inventory systems using the ath12k driver, focusing on devices with Qualcomm Atheros Wi-Fi chipsets, to prioritize patching efforts. 3) For embedded or specialized devices where kernel updates are not immediately feasible, consider disabling or limiting the use of affected wireless interfaces temporarily to reduce exposure to IRQ handling errors. 4) Monitor kernel logs for IRQ core warnings related to affinity hints, which can indicate the presence of this issue and help in early detection. 5) Engage with hardware vendors and Linux distribution maintainers to ensure timely delivery of patches and updates. 6) Implement robust system monitoring and alerting to detect any instability or crashes potentially linked to IRQ handling issues. These steps go beyond generic advice by focusing on targeted patching, device inventory, and proactive monitoring specific to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.824Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe81dc
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 7/3/2025, 9:43:47 PM
Last updated: 7/29/2025, 3:49:44 PM
Views: 9
Related Threats
CVE-2025-49898: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Xolluteon Dropshix
MediumCVE-2025-55207: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in withastro astro
MediumCVE-2025-49897: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gopiplus Vertical scroll slideshow gallery v2
HighCVE-2025-49432: CWE-862 Missing Authorization in FWDesign Ultimate Video Player
MediumCVE-2025-55203: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.