CVE-2025-23133: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: update channel list in reg notifier instead reg worker Currently when ath11k gets a new channel list, it will be processed according to the following steps: 1. update new channel list to cfg80211 and queue reg_work. 2. cfg80211 handles new channel list during reg_work. 3. update cfg80211's handled channel list to firmware by ath11k_reg_update_chan_list(). But ath11k will immediately execute step 3 after reg_work is just queued. Since step 2 is asynchronous, cfg80211 may not have completed handling the new channel list, which may leading to an out-of-bounds write error: BUG: KASAN: slab-out-of-bounds in ath11k_reg_update_chan_list Call Trace: ath11k_reg_update_chan_list+0xbfe/0xfe0 [ath11k] kfree+0x109/0x3a0 ath11k_regd_update+0x1cf/0x350 [ath11k] ath11k_regd_update_work+0x14/0x20 [ath11k] process_one_work+0xe35/0x14c0 Should ensure step 2 is completely done before executing step 3. Thus Wen raised patch[1]. When flag NL80211_REGDOM_SET_BY_DRIVER is set, cfg80211 will notify ath11k after step 2 is done. So enable the flag NL80211_REGDOM_SET_BY_DRIVER then cfg80211 will notify ath11k after step 2 is done. At this time, there will be no KASAN bug during the execution of the step 3. [1] https://patchwork.kernel.org/project/linux-wireless/patch/20230201065313.27203-1-quic_wgong@quicinc.com/ Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3
AI Analysis
Technical Summary
CVE-2025-23133 is a vulnerability identified in the Linux kernel's ath11k wireless driver, which manages Qualcomm Atheros Wi-Fi chipsets. The flaw arises from a race condition in the handling of updated regulatory domain channel lists. Specifically, when ath11k receives a new channel list, it follows a three-step process: (1) updating the new channel list to cfg80211 and queuing a regulatory work item (reg_work), (2) cfg80211 asynchronously processes the new channel list during reg_work, and (3) ath11k updates the firmware with the handled channel list via ath11k_reg_update_chan_list(). The vulnerability occurs because step 3 is executed immediately after queuing reg_work, without waiting for step 2 to complete. Since step 2 is asynchronous, cfg80211 may not have finished processing the new channel list when step 3 runs, leading to an out-of-bounds write error detected by Kernel Address Sanitizer (KASAN). This can cause memory corruption within the kernel space, potentially leading to system instability, crashes (kernel panic), or exploitable conditions for privilege escalation or denial of service. The patch to fix this issue involves enabling the NL80211_REGDOM_SET_BY_DRIVER flag, which ensures that cfg80211 notifies ath11k only after step 2 completes, thus preventing the premature execution of step 3 and eliminating the race condition. The vulnerability affects specific Linux kernel versions identified by commit hashes and has been tested on Qualcomm WCN6855 hardware. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to systems running affected Linux kernels with ath11k drivers, especially those using Qualcomm Atheros Wi-Fi chipsets in critical infrastructure, enterprise networks, or embedded devices. Exploitation could lead to kernel memory corruption, causing system crashes or enabling attackers to execute arbitrary code with kernel privileges. This could compromise confidentiality, integrity, and availability of affected systems. Given the widespread use of Linux in servers, network equipment, and IoT devices across Europe, successful exploitation could disrupt business operations, impact service availability, and expose sensitive data. The risk is heightened in environments where wireless connectivity is essential, such as telecommunications, manufacturing, healthcare, and government sectors. Although no active exploits are known, the vulnerability's nature suggests that motivated attackers could develop exploits, especially targeting high-value assets. The asynchronous handling flaw also indicates potential for exploitation in multi-threaded or high-load environments common in enterprise settings.
Mitigation Recommendations
European organizations should promptly apply the official Linux kernel patches that enable the NL80211_REGDOM_SET_BY_DRIVER flag to ensure proper synchronization in channel list updates. System administrators must verify that their Linux distributions have incorporated this fix or upgrade to patched kernel versions. For devices with Qualcomm Atheros Wi-Fi chipsets using ath11k, firmware updates should also be applied if available. Network security teams should monitor kernel logs for KASAN or related memory corruption warnings indicative of attempted exploitation. Implementing strict access controls to limit unprivileged user ability to trigger wireless regulatory changes can reduce attack surface. Additionally, organizations should conduct thorough testing of wireless drivers in their environments to detect anomalies. Employing kernel hardening techniques such as Kernel Page Table Isolation (KPTI) and Control Flow Integrity (CFI) can mitigate exploitation impact. Finally, maintaining up-to-date intrusion detection systems and endpoint protection can help identify and respond to exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2025-23133: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: update channel list in reg notifier instead reg worker Currently when ath11k gets a new channel list, it will be processed according to the following steps: 1. update new channel list to cfg80211 and queue reg_work. 2. cfg80211 handles new channel list during reg_work. 3. update cfg80211's handled channel list to firmware by ath11k_reg_update_chan_list(). But ath11k will immediately execute step 3 after reg_work is just queued. Since step 2 is asynchronous, cfg80211 may not have completed handling the new channel list, which may leading to an out-of-bounds write error: BUG: KASAN: slab-out-of-bounds in ath11k_reg_update_chan_list Call Trace: ath11k_reg_update_chan_list+0xbfe/0xfe0 [ath11k] kfree+0x109/0x3a0 ath11k_regd_update+0x1cf/0x350 [ath11k] ath11k_regd_update_work+0x14/0x20 [ath11k] process_one_work+0xe35/0x14c0 Should ensure step 2 is completely done before executing step 3. Thus Wen raised patch[1]. When flag NL80211_REGDOM_SET_BY_DRIVER is set, cfg80211 will notify ath11k after step 2 is done. So enable the flag NL80211_REGDOM_SET_BY_DRIVER then cfg80211 will notify ath11k after step 2 is done. At this time, there will be no KASAN bug during the execution of the step 3. [1] https://patchwork.kernel.org/project/linux-wireless/patch/20230201065313.27203-1-quic_wgong@quicinc.com/ Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3
AI-Powered Analysis
Technical Analysis
CVE-2025-23133 is a vulnerability identified in the Linux kernel's ath11k wireless driver, which manages Qualcomm Atheros Wi-Fi chipsets. The flaw arises from a race condition in the handling of updated regulatory domain channel lists. Specifically, when ath11k receives a new channel list, it follows a three-step process: (1) updating the new channel list to cfg80211 and queuing a regulatory work item (reg_work), (2) cfg80211 asynchronously processes the new channel list during reg_work, and (3) ath11k updates the firmware with the handled channel list via ath11k_reg_update_chan_list(). The vulnerability occurs because step 3 is executed immediately after queuing reg_work, without waiting for step 2 to complete. Since step 2 is asynchronous, cfg80211 may not have finished processing the new channel list when step 3 runs, leading to an out-of-bounds write error detected by Kernel Address Sanitizer (KASAN). This can cause memory corruption within the kernel space, potentially leading to system instability, crashes (kernel panic), or exploitable conditions for privilege escalation or denial of service. The patch to fix this issue involves enabling the NL80211_REGDOM_SET_BY_DRIVER flag, which ensures that cfg80211 notifies ath11k only after step 2 completes, thus preventing the premature execution of step 3 and eliminating the race condition. The vulnerability affects specific Linux kernel versions identified by commit hashes and has been tested on Qualcomm WCN6855 hardware. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to systems running affected Linux kernels with ath11k drivers, especially those using Qualcomm Atheros Wi-Fi chipsets in critical infrastructure, enterprise networks, or embedded devices. Exploitation could lead to kernel memory corruption, causing system crashes or enabling attackers to execute arbitrary code with kernel privileges. This could compromise confidentiality, integrity, and availability of affected systems. Given the widespread use of Linux in servers, network equipment, and IoT devices across Europe, successful exploitation could disrupt business operations, impact service availability, and expose sensitive data. The risk is heightened in environments where wireless connectivity is essential, such as telecommunications, manufacturing, healthcare, and government sectors. Although no active exploits are known, the vulnerability's nature suggests that motivated attackers could develop exploits, especially targeting high-value assets. The asynchronous handling flaw also indicates potential for exploitation in multi-threaded or high-load environments common in enterprise settings.
Mitigation Recommendations
European organizations should promptly apply the official Linux kernel patches that enable the NL80211_REGDOM_SET_BY_DRIVER flag to ensure proper synchronization in channel list updates. System administrators must verify that their Linux distributions have incorporated this fix or upgrade to patched kernel versions. For devices with Qualcomm Atheros Wi-Fi chipsets using ath11k, firmware updates should also be applied if available. Network security teams should monitor kernel logs for KASAN or related memory corruption warnings indicative of attempted exploitation. Implementing strict access controls to limit unprivileged user ability to trigger wireless regulatory changes can reduce attack surface. Additionally, organizations should conduct thorough testing of wireless drivers in their environments to detect anomalies. Employing kernel hardening techniques such as Kernel Page Table Isolation (KPTI) and Control Flow Integrity (CFI) can mitigate exploitation impact. Finally, maintaining up-to-date intrusion detection systems and endpoint protection can help identify and respond to exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-01-11T14:28:41.511Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd43c
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 7/3/2025, 9:56:21 PM
Last updated: 7/29/2025, 10:30:50 PM
Views: 13
Related Threats
CVE-2025-9008: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.