Skip to main content

CVE-2025-23133: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-23133cvecve-2025-23133
Published: Wed Apr 16 2025 (04/16/2025, 14:13:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: update channel list in reg notifier instead reg worker Currently when ath11k gets a new channel list, it will be processed according to the following steps: 1. update new channel list to cfg80211 and queue reg_work. 2. cfg80211 handles new channel list during reg_work. 3. update cfg80211's handled channel list to firmware by ath11k_reg_update_chan_list(). But ath11k will immediately execute step 3 after reg_work is just queued. Since step 2 is asynchronous, cfg80211 may not have completed handling the new channel list, which may leading to an out-of-bounds write error: BUG: KASAN: slab-out-of-bounds in ath11k_reg_update_chan_list Call Trace: ath11k_reg_update_chan_list+0xbfe/0xfe0 [ath11k] kfree+0x109/0x3a0 ath11k_regd_update+0x1cf/0x350 [ath11k] ath11k_regd_update_work+0x14/0x20 [ath11k] process_one_work+0xe35/0x14c0 Should ensure step 2 is completely done before executing step 3. Thus Wen raised patch[1]. When flag NL80211_REGDOM_SET_BY_DRIVER is set, cfg80211 will notify ath11k after step 2 is done. So enable the flag NL80211_REGDOM_SET_BY_DRIVER then cfg80211 will notify ath11k after step 2 is done. At this time, there will be no KASAN bug during the execution of the step 3. [1] https://patchwork.kernel.org/project/linux-wireless/patch/20230201065313.27203-1-quic_wgong@quicinc.com/ Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3

AI-Powered Analysis

AILast updated: 07/03/2025, 21:56:21 UTC

Technical Analysis

CVE-2025-23133 is a vulnerability identified in the Linux kernel's ath11k wireless driver, which manages Qualcomm Atheros Wi-Fi chipsets. The flaw arises from a race condition in the handling of updated regulatory domain channel lists. Specifically, when ath11k receives a new channel list, it follows a three-step process: (1) updating the new channel list to cfg80211 and queuing a regulatory work item (reg_work), (2) cfg80211 asynchronously processes the new channel list during reg_work, and (3) ath11k updates the firmware with the handled channel list via ath11k_reg_update_chan_list(). The vulnerability occurs because step 3 is executed immediately after queuing reg_work, without waiting for step 2 to complete. Since step 2 is asynchronous, cfg80211 may not have finished processing the new channel list when step 3 runs, leading to an out-of-bounds write error detected by Kernel Address Sanitizer (KASAN). This can cause memory corruption within the kernel space, potentially leading to system instability, crashes (kernel panic), or exploitable conditions for privilege escalation or denial of service. The patch to fix this issue involves enabling the NL80211_REGDOM_SET_BY_DRIVER flag, which ensures that cfg80211 notifies ath11k only after step 2 completes, thus preventing the premature execution of step 3 and eliminating the race condition. The vulnerability affects specific Linux kernel versions identified by commit hashes and has been tested on Qualcomm WCN6855 hardware. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to systems running affected Linux kernels with ath11k drivers, especially those using Qualcomm Atheros Wi-Fi chipsets in critical infrastructure, enterprise networks, or embedded devices. Exploitation could lead to kernel memory corruption, causing system crashes or enabling attackers to execute arbitrary code with kernel privileges. This could compromise confidentiality, integrity, and availability of affected systems. Given the widespread use of Linux in servers, network equipment, and IoT devices across Europe, successful exploitation could disrupt business operations, impact service availability, and expose sensitive data. The risk is heightened in environments where wireless connectivity is essential, such as telecommunications, manufacturing, healthcare, and government sectors. Although no active exploits are known, the vulnerability's nature suggests that motivated attackers could develop exploits, especially targeting high-value assets. The asynchronous handling flaw also indicates potential for exploitation in multi-threaded or high-load environments common in enterprise settings.

Mitigation Recommendations

European organizations should promptly apply the official Linux kernel patches that enable the NL80211_REGDOM_SET_BY_DRIVER flag to ensure proper synchronization in channel list updates. System administrators must verify that their Linux distributions have incorporated this fix or upgrade to patched kernel versions. For devices with Qualcomm Atheros Wi-Fi chipsets using ath11k, firmware updates should also be applied if available. Network security teams should monitor kernel logs for KASAN or related memory corruption warnings indicative of attempted exploitation. Implementing strict access controls to limit unprivileged user ability to trigger wireless regulatory changes can reduce attack surface. Additionally, organizations should conduct thorough testing of wireless drivers in their environments to detect anomalies. Employing kernel hardening techniques such as Kernel Page Table Isolation (KPTI) and Control Flow Integrity (CFI) can mitigate exploitation impact. Finally, maintaining up-to-date intrusion detection systems and endpoint protection can help identify and respond to exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-01-11T14:28:41.511Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdd43c

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 7/3/2025, 9:56:21 PM

Last updated: 7/29/2025, 10:30:50 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats