Skip to main content

CVE-2025-37744: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37744cvecve-2025-37744
Published: Thu May 01 2025 (05/01/2025, 12:55:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memory leak in ath12k_pci_remove() Kmemleak reported this error: unreferenced object 0xffff1c165cec3060 (size 32): comm "insmod", pid 560, jiffies 4296964570 (age 235.596s) backtrace: [<000000005434db68>] __kmem_cache_alloc_node+0x1f4/0x2c0 [<000000001203b155>] kmalloc_trace+0x40/0x88 [<0000000028adc9c8>] _request_firmware+0xb8/0x608 [<00000000cad1aef7>] firmware_request_nowarn+0x50/0x80 [<000000005011a682>] local_pci_probe+0x48/0xd0 [<00000000077cd295>] pci_device_probe+0xb4/0x200 [<0000000087184c94>] really_probe+0x150/0x2c0 The firmware memory was allocated in ath12k_pci_probe(), but not freed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is set. So call ath12k_fw_unmap() to free the memory. Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1

AI-Powered Analysis

AILast updated: 07/03/2025, 22:26:44 UTC

Technical Analysis

CVE-2025-37744 is a vulnerability identified in the Linux kernel specifically affecting the ath12k PCI wireless driver, which supports certain Qualcomm Atheros Wi-Fi chipsets such as the WCN7850 hardware. The issue is a memory leak occurring in the ath12k_pci_remove() function. During the device removal process, if the ATH12K_FLAG_QMI_FAIL bit is set, the allocated firmware memory is not properly freed because the function ath12k_fw_unmap() is not called. This leads to unreferenced memory objects remaining allocated, as detected by the kernel's kmemleak tool. The memory leak originates from the firmware allocation in ath12k_pci_probe() but lacks corresponding deallocation in the removal path under specific failure conditions. While this vulnerability does not appear to have an associated CVSS score yet and no known exploits are reported in the wild, it represents a resource management flaw in a critical kernel driver component related to wireless networking. The vulnerability was tested on the WCN7850 hw2.0 PCI WLAN hardware, indicating it affects devices using this hardware or similar Qualcomm Atheros chipsets supported by the ath12k driver. The leak could potentially degrade system stability or performance over time due to unreleased memory consumption, especially in environments where devices are frequently added and removed or where the failure condition triggering the leak occurs often.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns systems running Linux kernels with the affected ath12k wireless driver, particularly those using Qualcomm Atheros WCN7850 or similar chipsets. The memory leak could lead to gradual resource exhaustion, causing system instability, degraded performance, or potential denial of service conditions in critical network infrastructure or endpoint devices. This is especially relevant for enterprises relying on Linux-based wireless access points, embedded devices, or servers with PCI Wi-Fi cards using the affected hardware. While the vulnerability does not directly enable code execution or privilege escalation, the resulting instability could disrupt business operations, particularly in sectors with high availability requirements such as finance, telecommunications, and critical infrastructure. Additionally, the leak could complicate forensic analysis or incident response by masking other issues or causing unpredictable system behavior. Since no known exploits exist yet, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent potential escalation or exploitation in the future.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify and inventory Linux systems using the ath12k driver with Qualcomm Atheros WCN7850 or related chipsets. 2) Apply the official Linux kernel patches that fix the memory leak in ath12k_pci_remove() as soon as they become available, or upgrade to a kernel version that includes this fix. 3) Monitor system logs and use kernel memory leak detection tools like kmemleak to detect any anomalous memory usage patterns related to wireless device removal. 4) Limit frequent hot-plugging or removal of affected PCI wireless devices until patched to reduce the risk of memory leaks accumulating. 5) For embedded or specialized devices, coordinate with hardware vendors or Linux distribution maintainers to ensure timely deployment of patches. 6) Implement robust system monitoring and alerting to detect early signs of resource exhaustion or instability potentially linked to this vulnerability. 7) Maintain a comprehensive asset management process to track affected hardware and software versions across the organization. These targeted steps go beyond generic advice by focusing on the specific driver, hardware, and operational contexts relevant to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.936Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd84ba

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/3/2025, 10:26:44 PM

Last updated: 8/18/2025, 7:27:09 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats