CVE-2025-37744: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memory leak in ath12k_pci_remove() Kmemleak reported this error: unreferenced object 0xffff1c165cec3060 (size 32): comm "insmod", pid 560, jiffies 4296964570 (age 235.596s) backtrace: [<000000005434db68>] __kmem_cache_alloc_node+0x1f4/0x2c0 [<000000001203b155>] kmalloc_trace+0x40/0x88 [<0000000028adc9c8>] _request_firmware+0xb8/0x608 [<00000000cad1aef7>] firmware_request_nowarn+0x50/0x80 [<000000005011a682>] local_pci_probe+0x48/0xd0 [<00000000077cd295>] pci_device_probe+0xb4/0x200 [<0000000087184c94>] really_probe+0x150/0x2c0 The firmware memory was allocated in ath12k_pci_probe(), but not freed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is set. So call ath12k_fw_unmap() to free the memory. Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1
AI Analysis
Technical Summary
CVE-2025-37744 is a vulnerability identified in the Linux kernel specifically affecting the ath12k PCI wireless driver, which supports certain Qualcomm Atheros Wi-Fi chipsets such as the WCN7850 hardware. The issue is a memory leak occurring in the ath12k_pci_remove() function. During the device removal process, if the ATH12K_FLAG_QMI_FAIL bit is set, the allocated firmware memory is not properly freed because the function ath12k_fw_unmap() is not called. This leads to unreferenced memory objects remaining allocated, as detected by the kernel's kmemleak tool. The memory leak originates from the firmware allocation in ath12k_pci_probe() but lacks corresponding deallocation in the removal path under specific failure conditions. While this vulnerability does not appear to have an associated CVSS score yet and no known exploits are reported in the wild, it represents a resource management flaw in a critical kernel driver component related to wireless networking. The vulnerability was tested on the WCN7850 hw2.0 PCI WLAN hardware, indicating it affects devices using this hardware or similar Qualcomm Atheros chipsets supported by the ath12k driver. The leak could potentially degrade system stability or performance over time due to unreleased memory consumption, especially in environments where devices are frequently added and removed or where the failure condition triggering the leak occurs often.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns systems running Linux kernels with the affected ath12k wireless driver, particularly those using Qualcomm Atheros WCN7850 or similar chipsets. The memory leak could lead to gradual resource exhaustion, causing system instability, degraded performance, or potential denial of service conditions in critical network infrastructure or endpoint devices. This is especially relevant for enterprises relying on Linux-based wireless access points, embedded devices, or servers with PCI Wi-Fi cards using the affected hardware. While the vulnerability does not directly enable code execution or privilege escalation, the resulting instability could disrupt business operations, particularly in sectors with high availability requirements such as finance, telecommunications, and critical infrastructure. Additionally, the leak could complicate forensic analysis or incident response by masking other issues or causing unpredictable system behavior. Since no known exploits exist yet, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent potential escalation or exploitation in the future.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify and inventory Linux systems using the ath12k driver with Qualcomm Atheros WCN7850 or related chipsets. 2) Apply the official Linux kernel patches that fix the memory leak in ath12k_pci_remove() as soon as they become available, or upgrade to a kernel version that includes this fix. 3) Monitor system logs and use kernel memory leak detection tools like kmemleak to detect any anomalous memory usage patterns related to wireless device removal. 4) Limit frequent hot-plugging or removal of affected PCI wireless devices until patched to reduce the risk of memory leaks accumulating. 5) For embedded or specialized devices, coordinate with hardware vendors or Linux distribution maintainers to ensure timely deployment of patches. 6) Implement robust system monitoring and alerting to detect early signs of resource exhaustion or instability potentially linked to this vulnerability. 7) Maintain a comprehensive asset management process to track affected hardware and software versions across the organization. These targeted steps go beyond generic advice by focusing on the specific driver, hardware, and operational contexts relevant to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-37744: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memory leak in ath12k_pci_remove() Kmemleak reported this error: unreferenced object 0xffff1c165cec3060 (size 32): comm "insmod", pid 560, jiffies 4296964570 (age 235.596s) backtrace: [<000000005434db68>] __kmem_cache_alloc_node+0x1f4/0x2c0 [<000000001203b155>] kmalloc_trace+0x40/0x88 [<0000000028adc9c8>] _request_firmware+0xb8/0x608 [<00000000cad1aef7>] firmware_request_nowarn+0x50/0x80 [<000000005011a682>] local_pci_probe+0x48/0xd0 [<00000000077cd295>] pci_device_probe+0xb4/0x200 [<0000000087184c94>] really_probe+0x150/0x2c0 The firmware memory was allocated in ath12k_pci_probe(), but not freed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is set. So call ath12k_fw_unmap() to free the memory. Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1
AI-Powered Analysis
Technical Analysis
CVE-2025-37744 is a vulnerability identified in the Linux kernel specifically affecting the ath12k PCI wireless driver, which supports certain Qualcomm Atheros Wi-Fi chipsets such as the WCN7850 hardware. The issue is a memory leak occurring in the ath12k_pci_remove() function. During the device removal process, if the ATH12K_FLAG_QMI_FAIL bit is set, the allocated firmware memory is not properly freed because the function ath12k_fw_unmap() is not called. This leads to unreferenced memory objects remaining allocated, as detected by the kernel's kmemleak tool. The memory leak originates from the firmware allocation in ath12k_pci_probe() but lacks corresponding deallocation in the removal path under specific failure conditions. While this vulnerability does not appear to have an associated CVSS score yet and no known exploits are reported in the wild, it represents a resource management flaw in a critical kernel driver component related to wireless networking. The vulnerability was tested on the WCN7850 hw2.0 PCI WLAN hardware, indicating it affects devices using this hardware or similar Qualcomm Atheros chipsets supported by the ath12k driver. The leak could potentially degrade system stability or performance over time due to unreleased memory consumption, especially in environments where devices are frequently added and removed or where the failure condition triggering the leak occurs often.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns systems running Linux kernels with the affected ath12k wireless driver, particularly those using Qualcomm Atheros WCN7850 or similar chipsets. The memory leak could lead to gradual resource exhaustion, causing system instability, degraded performance, or potential denial of service conditions in critical network infrastructure or endpoint devices. This is especially relevant for enterprises relying on Linux-based wireless access points, embedded devices, or servers with PCI Wi-Fi cards using the affected hardware. While the vulnerability does not directly enable code execution or privilege escalation, the resulting instability could disrupt business operations, particularly in sectors with high availability requirements such as finance, telecommunications, and critical infrastructure. Additionally, the leak could complicate forensic analysis or incident response by masking other issues or causing unpredictable system behavior. Since no known exploits exist yet, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent potential escalation or exploitation in the future.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify and inventory Linux systems using the ath12k driver with Qualcomm Atheros WCN7850 or related chipsets. 2) Apply the official Linux kernel patches that fix the memory leak in ath12k_pci_remove() as soon as they become available, or upgrade to a kernel version that includes this fix. 3) Monitor system logs and use kernel memory leak detection tools like kmemleak to detect any anomalous memory usage patterns related to wireless device removal. 4) Limit frequent hot-plugging or removal of affected PCI wireless devices until patched to reduce the risk of memory leaks accumulating. 5) For embedded or specialized devices, coordinate with hardware vendors or Linux distribution maintainers to ensure timely deployment of patches. 6) Implement robust system monitoring and alerting to detect early signs of resource exhaustion or instability potentially linked to this vulnerability. 7) Maintain a comprehensive asset management process to track affected hardware and software versions across the organization. These targeted steps go beyond generic advice by focusing on the specific driver, hardware, and operational contexts relevant to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.936Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd84ba
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/3/2025, 10:26:44 PM
Last updated: 8/18/2025, 7:27:09 PM
Views: 19
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.