Bug 2360303 (CVE-2025-22128) - CVE-2025-22128 kernel: wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path
Summary: CVE-2025-22128 kernel: wifi: ath12k: Clear affinity hint before calling ath12...
Keywords:
Status: NEW
Alias: CVE-2025-22128
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-16 15:07 UTC by OSIDB Bzimport
Modified: 2025-04-17 06:10 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-04-16 15:07:08 UTC
In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path

If a shared IRQ is used by the driver due to platform limitation, then the
IRQ affinity hint is set right after the allocation of IRQ vectors in
ath12k_pci_msi_alloc(). This does no harm unless one of the functions
requesting the IRQ fails and attempt to free the IRQ.

This may end up with a warning from the IRQ core that is expecting the
affinity hint to be cleared before freeing the IRQ:

kernel/irq/manage.c:

	/* make sure affinity_hint is cleaned up */
	if (WARN_ON_ONCE(desc->affinity_hint))
		desc->affinity_hint = NULL;

So to fix this issue, clear the IRQ affinity hint before calling
ath12k_pci_free_irq() in the error path. The affinity will be cleared once
again further down the error path due to code organization, but that does
no harm.

Comment 1 Avinash Hanwate 2025-04-17 05:14:37 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025041630-CVE-2025-22128-c025@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.