Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 16, 2025

      This week in AI dev tools: Apple’s Foundations Model framework, Mistral’s first reasoning model, and more (June 13, 2025)

      June 13, 2025

      Open Talent platforms emerging to match skilled workers to needs, study finds

      June 13, 2025

      Java never goes out of style: Celebrating 30 years of the language

      June 12, 2025

      The 5 gadgets that got me through marathons and obstacle races (and why they work)

      June 16, 2025

      This beastly 500W charger replaced every other charger I had – with six ports to boot

      June 16, 2025

      Mac Mini won’t power on? Apple will fix it for you – for free

      June 16, 2025

      Why I’m switching to VS Code. Hint: It’s all about AI tool integration

      June 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      From Concept to Code: Final Year PHP Projects with Reports for Smart Submissions

      June 16, 2025
      Recent

      From Concept to Code: Final Year PHP Projects with Reports for Smart Submissions

      June 16, 2025

      Building Construction suppliers in India

      June 16, 2025

      Neutralinojs v6.1 released

      June 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft Edge’s Quiet Shift to AVIF: Why It Matters

      June 16, 2025
      Recent

      Microsoft Edge’s Quiet Shift to AVIF: Why It Matters

      June 16, 2025

      Windows 11 test builds are accidentally playing the Windows Vista startup sound

      June 16, 2025

      Leaked: ROG Xbox Ally and Xbox Ally X pre-orders set for August, launch in October

      June 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37794 – “Qualcomm Atheros Linux Wi-Fi Driver NULL Pointer Dereference Vulnerability”

    CVE-2025-37794 – “Qualcomm Atheros Linux Wi-Fi Driver NULL Pointer Dereference Vulnerability”

    May 1, 2025

    CVE ID : CVE-2025-37794

    Published : May 1, 2025, 2:15 p.m. | 1 hour, 10 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    wifi: mac80211: Purge vif txq in ieee80211_do_stop()

    After ieee80211_do_stop() SKB from vif’s txq could still be processed.
    Indeed another concurrent vif schedule_and_wake_txq call could cause
    those packets to be dequeued (see ieee80211_handle_wake_tx_queue())
    without checking the sdata current state.

    Because vif.drv_priv is now cleared in this function, this could lead to
    driver crash.

    For example in ath12k, ahvif is store in vif.drv_priv. Thus if
    ath12k_mac_op_tx() is called after ieee80211_do_stop(), ahvif->ah can be
    NULL, leading the ath12k_warn(ahvif->ah,…) call in this function to
    trigger the NULL deref below.

    Unable to handle kernel paging request at virtual address dfffffc000000001
    KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
    batman_adv: bat0: Interface deactivated: brbh1337
    Mem abort info:
    ESR = 0x0000000096000004
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x04: level 0 translation fault
    Data abort info:
    ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
    CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
    [dfffffc000000001] address between user and kernel address ranges
    Internal error: Oops: 0000000096000004 [#1] SMP
    CPU: 1 UID: 0 PID: 978 Comm: lbd Not tainted 6.13.0-g633f875b8f1e #114
    Hardware name: HW (DT)
    pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=–)
    pc : ath12k_mac_op_tx+0x6cc/0x29b8 [ath12k]
    lr : ath12k_mac_op_tx+0x174/0x29b8 [ath12k]
    sp : ffffffc086ace450
    x29: ffffffc086ace450 x28: 0000000000000000 x27: 1ffffff810d59ca4
    x26: ffffff801d05f7c0 x25: 0000000000000000 x24: 000000004000001e
    x23: ffffff8009ce4926 x22: ffffff801f9c0800 x21: ffffff801d05f7f0
    x20: ffffff8034a19f40 x19: 0000000000000000 x18: ffffff801f9c0958
    x17: ffffff800bc0a504 x16: dfffffc000000000 x15: ffffffc086ace4f8
    x14: ffffff801d05f83c x13: 0000000000000000 x12: ffffffb003a0bf03
    x11: 0000000000000000 x10: ffffffb003a0bf02 x9 : ffffff8034a19f40
    x8 : ffffff801d05f818 x7 : 1ffffff0069433dc x6 : ffffff8034a19ee0
    x5 : ffffff801d05f7f0 x4 : 0000000000000000 x3 : 0000000000000001
    x2 : 0000000000000000 x1 : dfffffc000000000 x0 : 0000000000000008
    Call trace:
    ath12k_mac_op_tx+0x6cc/0x29b8 [ath12k] (P)
    ieee80211_handle_wake_tx_queue+0x16c/0x260
    ieee80211_queue_skb+0xeec/0x1d20
    ieee80211_tx+0x200/0x2c8
    ieee80211_xmit+0x22c/0x338
    __ieee80211_subif_start_xmit+0x7e8/0xc60
    ieee80211_subif_start_xmit+0xc4/0xee0
    __ieee80211_subif_start_xmit_8023.isra.0+0x854/0x17a0
    ieee80211_subif_start_xmit_8023+0x124/0x488
    dev_hard_start_xmit+0x160/0x5a8
    __dev_queue_xmit+0x6f8/0x3120
    br_dev_queue_push_xmit+0x120/0x4a8
    __br_forward+0xe4/0x2b0
    deliver_clone+0x5c/0xd0
    br_flood+0x398/0x580
    br_dev_xmit+0x454/0x9f8
    dev_hard_start_xmit+0x160/0x5a8
    __dev_queue_xmit+0x6f8/0x3120
    ip6_finish_output2+0xc28/0x1b60
    __ip6_finish_output+0x38c/0x638
    ip6_output+0x1b4/0x338
    ip6_local_out+0x7c/0xa8
    ip6_send_skb+0x7c/0x1b0
    ip6_push_pending_frames+0x94/0xd0
    rawv6_sendmsg+0x1a98/0x2898
    inet_sendmsg+0x94/0xe0
    __sys_sendto+0x1e4/0x308
    __arm64_sys_sendto+0xc4/0x140
    do_el0_svc+0x110/0x280
    el0_svc+0x20/0x60
    el0t_64_sync_handler+0x104/0x138
    el0t_64_sync+0x154/0x158

    To avoid that, empty vif’s txq at ieee80211_do_stop() so no packet could
    be dequeued after ieee80211_do_stop() (new packets cannot be queued
    because SDATA_STATE_RUNNING is cleared at this point).

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37795 – Linux Kernel wifi ath11k Use After Free
    Next Article CVE-2025-37793 – Intel ASoC avs Null Pointer Dereference Vulnerability

    Related Posts

    Security

    Team46 (TaxOff) Exploits Google Chrome Zero-Day (CVE-2025-2783) in Sophisticated Phishing Campaign

    June 17, 2025
    Security

    High-Severity Flaw Exposes ASUS Armoury Crate to Authentication Bypass

    June 17, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    12 Best Free and Open Source Food and Drink Software

    Linux
    Ahold Delhaize USA Confirms Data Stolen in 2024 Cyberattack

    Ahold Delhaize USA Confirms Data Stolen in 2024 Cyberattack

    Development

    CVE-2025-32928 – ThemeGoods Altair Object Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Multi Vulnerabilities Found in SonicWall SMA 100 Series Prompt Urgent Security Update

    Security

    Highlights

    Top Data Center Service Providers in Delhi – Reliable and Scalable Solutions

    May 3, 2025

    Post Content Source: Read More 

    CVE-2025-5053 – FreeFloat FTP Server MDIR Command Handler Buffer Overflow

    May 21, 2025

    This Amazon Wi-Fi 7 router solved my biggest smart home internet issue – and it’s on sale

    May 23, 2025

    How can we build human values into AI?

    May 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.