Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: Functionally, a Date

      September 16, 2025

      Creating Elastic And Bounce Effects With Expressive Animator

      September 16, 2025

      Microsoft shares Insiders preview of Visual Studio 2026

      September 16, 2025

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Can I use React Server Components (RSCs) today?

      September 16, 2025
      Recent

      Can I use React Server Components (RSCs) today?

      September 16, 2025

      Perficient Named among Notable Providers in Forrester’s Q3 2025 Commerce Services Landscape

      September 16, 2025

      Sarah McDowell Helps Clients Build a Strong AI Foundation Through Salesforce

      September 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I Ran Local LLMs on My Android Phone

      September 16, 2025
      Recent

      I Ran Local LLMs on My Android Phone

      September 16, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37794 – “Qualcomm Atheros Linux Wi-Fi Driver NULL Pointer Dereference Vulnerability”

    CVE-2025-37794 – “Qualcomm Atheros Linux Wi-Fi Driver NULL Pointer Dereference Vulnerability”

    May 1, 2025

    CVE ID : CVE-2025-37794

    Published : May 1, 2025, 2:15 p.m. | 1 hour, 10 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    wifi: mac80211: Purge vif txq in ieee80211_do_stop()

    After ieee80211_do_stop() SKB from vif’s txq could still be processed.
    Indeed another concurrent vif schedule_and_wake_txq call could cause
    those packets to be dequeued (see ieee80211_handle_wake_tx_queue())
    without checking the sdata current state.

    Because vif.drv_priv is now cleared in this function, this could lead to
    driver crash.

    For example in ath12k, ahvif is store in vif.drv_priv. Thus if
    ath12k_mac_op_tx() is called after ieee80211_do_stop(), ahvif->ah can be
    NULL, leading the ath12k_warn(ahvif->ah,…) call in this function to
    trigger the NULL deref below.

    Unable to handle kernel paging request at virtual address dfffffc000000001
    KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
    batman_adv: bat0: Interface deactivated: brbh1337
    Mem abort info:
    ESR = 0x0000000096000004
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x04: level 0 translation fault
    Data abort info:
    ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
    CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
    [dfffffc000000001] address between user and kernel address ranges
    Internal error: Oops: 0000000096000004 [#1] SMP
    CPU: 1 UID: 0 PID: 978 Comm: lbd Not tainted 6.13.0-g633f875b8f1e #114
    Hardware name: HW (DT)
    pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=–)
    pc : ath12k_mac_op_tx+0x6cc/0x29b8 [ath12k]
    lr : ath12k_mac_op_tx+0x174/0x29b8 [ath12k]
    sp : ffffffc086ace450
    x29: ffffffc086ace450 x28: 0000000000000000 x27: 1ffffff810d59ca4
    x26: ffffff801d05f7c0 x25: 0000000000000000 x24: 000000004000001e
    x23: ffffff8009ce4926 x22: ffffff801f9c0800 x21: ffffff801d05f7f0
    x20: ffffff8034a19f40 x19: 0000000000000000 x18: ffffff801f9c0958
    x17: ffffff800bc0a504 x16: dfffffc000000000 x15: ffffffc086ace4f8
    x14: ffffff801d05f83c x13: 0000000000000000 x12: ffffffb003a0bf03
    x11: 0000000000000000 x10: ffffffb003a0bf02 x9 : ffffff8034a19f40
    x8 : ffffff801d05f818 x7 : 1ffffff0069433dc x6 : ffffff8034a19ee0
    x5 : ffffff801d05f7f0 x4 : 0000000000000000 x3 : 0000000000000001
    x2 : 0000000000000000 x1 : dfffffc000000000 x0 : 0000000000000008
    Call trace:
    ath12k_mac_op_tx+0x6cc/0x29b8 [ath12k] (P)
    ieee80211_handle_wake_tx_queue+0x16c/0x260
    ieee80211_queue_skb+0xeec/0x1d20
    ieee80211_tx+0x200/0x2c8
    ieee80211_xmit+0x22c/0x338
    __ieee80211_subif_start_xmit+0x7e8/0xc60
    ieee80211_subif_start_xmit+0xc4/0xee0
    __ieee80211_subif_start_xmit_8023.isra.0+0x854/0x17a0
    ieee80211_subif_start_xmit_8023+0x124/0x488
    dev_hard_start_xmit+0x160/0x5a8
    __dev_queue_xmit+0x6f8/0x3120
    br_dev_queue_push_xmit+0x120/0x4a8
    __br_forward+0xe4/0x2b0
    deliver_clone+0x5c/0xd0
    br_flood+0x398/0x580
    br_dev_xmit+0x454/0x9f8
    dev_hard_start_xmit+0x160/0x5a8
    __dev_queue_xmit+0x6f8/0x3120
    ip6_finish_output2+0xc28/0x1b60
    __ip6_finish_output+0x38c/0x638
    ip6_output+0x1b4/0x338
    ip6_local_out+0x7c/0xa8
    ip6_send_skb+0x7c/0x1b0
    ip6_push_pending_frames+0x94/0xd0
    rawv6_sendmsg+0x1a98/0x2898
    inet_sendmsg+0x94/0xe0
    __sys_sendto+0x1e4/0x308
    __arm64_sys_sendto+0xc4/0x140
    do_el0_svc+0x110/0x280
    el0_svc+0x20/0x60
    el0t_64_sync_handler+0x104/0x138
    el0t_64_sync+0x154/0x158

    To avoid that, empty vif’s txq at ieee80211_do_stop() so no packet could
    be dequeued after ieee80211_do_stop() (new packets cannot be queued
    because SDATA_STATE_RUNNING is cleared at this point).

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37795 – Linux Kernel wifi ath11k Use After Free
    Next Article CVE-2025-37793 – Intel ASoC avs Null Pointer Dereference Vulnerability

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-22437 – Android Media Button Receiver Activity Hijacking

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5412 – Mist Community Edition Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    20+ Best Free Slideshow & Gallery Templates for After Effects in 2025

    Learning Resources

    As a golfer, this is the smartwatch I recommend most on the course

    News & Updates

    Highlights

    CVE-2025-1493 – IBM Db2 Denial of Service

    May 5, 2025

    CVE ID : CVE-2025-1493

    Published : May 5, 2025, 9:15 p.m. | 2 hours, 18 minutes ago

    Description : IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 12.1.0 through 12.1.1

    could allow an authenticated user to cause a denial of service due to concurrent execution of shared resources.

    Severity: 5.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Every Xbox and PC game announced during Summer Game Fest and the Xbox Games Showcase in 2025

    June 7, 2025

    Will you sync your Windows 10 PC data to the cloud for free access to security updates beyond 2025?

    June 25, 2025

    CVE-2025-6493 – CodeMirror Markdown Mode Regular Expression Complexity Remote Vulnerability

    June 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.