Skip to main content

CVE-2025-37743: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37743cvecve-2025-37743
Published: Thu May 01 2025 (05/01/2025, 12:55:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Avoid memory leak while enabling statistics Driver uses monitor destination rings for extended statistics mode and standalone monitor mode. In extended statistics mode, TLVs are parsed from the buffer received from the monitor destination ring and assigned to the ppdu_info structure to update per-packet statistics. In standalone monitor mode, along with per-packet statistics, the packet data (payload) is captured, and the driver updates per MSDU to mac80211. When the AP interface is enabled, only extended statistics mode is activated. As part of enabling monitor rings for collecting statistics, the driver subscribes to HAL_RX_MPDU_START TLV in the filter configuration. This TLV is received from the monitor destination ring, and kzalloc for the mon_mpdu object occurs, which is not freed, leading to a memory leak. The kzalloc for the mon_mpdu object is only required while enabling the standalone monitor interface. This causes a memory leak while enabling extended statistics mode in the driver. Fix this memory leak by removing the kzalloc for the mon_mpdu object in the HAL_RX_MPDU_START TLV handling. Additionally, remove the standalone monitor mode handlings in the HAL_MON_BUF_ADDR and HAL_RX_MSDU_END TLVs. These TLV tags will be handled properly when enabling standalone monitor mode in the future. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1 Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3

AI-Powered Analysis

AILast updated: 07/03/2025, 22:26:33 UTC

Technical Analysis

CVE-2025-37743 is a memory leak vulnerability identified in the Linux kernel's ath12k wireless driver, which handles Qualcomm Atheros Wi-Fi chipsets. The vulnerability arises from improper memory management in the driver's handling of monitor destination rings used for extended statistics mode. Specifically, when the Access Point (AP) interface is enabled, the driver activates extended statistics mode and subscribes to the HAL_RX_MPDU_START TLV (Type-Length-Value) in the filter configuration. Upon receiving this TLV, the driver allocates memory (using kzalloc) for a mon_mpdu object but fails to free it, causing a memory leak. This allocation is only necessary when enabling standalone monitor mode, which is not active in extended statistics mode, leading to unnecessary and unreleased memory consumption. The vulnerability does not affect standalone monitor mode operations, as those are handled separately and correctly. The fix involves removing the kzalloc call for the mon_mpdu object during HAL_RX_MPDU_START TLV handling in extended statistics mode and deferring standalone monitor mode TLV handling to future updates. The flaw was tested on specific hardware versions (QCN9274 hw2.0 and WCN7850 hw2.0) and associated firmware builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and specific to Linux kernel versions incorporating the affected ath12k driver code, impacting systems using these Qualcomm Atheros Wi-Fi chipsets.

Potential Impact

For European organizations, this vulnerability could lead to gradual memory exhaustion on affected Linux systems using the ath12k driver in AP mode with extended statistics enabled. While it does not directly allow code execution or privilege escalation, the memory leak can degrade system stability and availability over time, potentially causing service interruptions or crashes in critical network infrastructure such as wireless access points, routers, or embedded devices running Linux. This could impact enterprises, ISPs, and public institutions relying on Linux-based wireless networking equipment. The leak might also complicate forensic or monitoring activities due to corrupted or incomplete statistics data. Although exploitation requires specific driver usage scenarios and does not involve user interaction or authentication, the widespread deployment of Linux and Qualcomm Atheros chipsets in Europe means that many organizations could be affected if patches are not applied promptly. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks leveraging this vulnerability to cause denial-of-service conditions.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel versions to include the patch that removes the unnecessary kzalloc call in the ath12k driver. Since the vulnerability is specific to certain Qualcomm Atheros chipsets, organizations should inventory their hardware to identify affected devices. For embedded or specialized devices where kernel updates are not straightforward, consider disabling extended statistics mode or the AP interface temporarily if feasible to mitigate memory leak risks. Network administrators should monitor system memory usage on wireless infrastructure for abnormal increases that could indicate exploitation attempts. Additionally, vendors and integrators should be engaged to ensure firmware and driver updates are deployed promptly. Implementing robust system monitoring and alerting for memory leaks and crashes in wireless networking components will help detect exploitation attempts early. Finally, organizations should maintain up-to-date backups and incident response plans to address potential service disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.936Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd84a7

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/3/2025, 10:26:33 PM

Last updated: 7/31/2025, 5:33:14 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats