Bug 2367603 (CVE-2025-37976)
Summary: | CVE-2025-37976 kernel: wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | unspecified | CC: | dfreiber, drow, jburrell, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | --- | |
Doc Text: |
This CVE has been marked as Rejected by the assigning CNA.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
OSIDB Bzimport
2025-05-20 18:01:22 UTC
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025052039-CVE-2025-37976-7371@gregkh/T This CVE has been rejected by the Linux kernel community. Refer to the announcement: https://lore.kernel.org/linux-cve-announce/2025061801-REJECTED-6bfe@gregkh/ Incorrect use of source-ring fetch function for a destination ring led to invalid pointer access. The patch replaces the call with the correct API to prevent kernel crashes or memory corruption when processing destination ring entries. Comment added by: Automated Script |