Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-38157

Опубликовано: 03 июл. 2025
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Abort software beacon handling if disabled A malicious USB device can send a WMI_SWBA_EVENTID event from an ath9k_htc-managed device before beaconing has been enabled. This causes a device-by-zero error in the driver, leading to either a crash or an out of bounds read. Prevent this by aborting the handling in ath9k_htc_swba() if beacons are not enabled.

A flaw was found in the Linux kernel's ath9k_htc Wi-Fi driver. A malicious Universal Serial Bus (USB) device can send a specific event (WMI_SWBA_EVENTID) before the Wi-Fi beaconing feature is enabled. This can lead to a critical error within the driver, potentially causing the system to crash (Denial of Service) or allowing an attacker to read sensitive information from memory (information disclosure).

Отчет

This flaw is being treated as a Moderate Impact flaw, which leads to a Denial Of Service threat with a normal user. This vulnerability could even lead to a kernel information leak problem with a special group access privilege.

Меры по смягчению последствий

To mitigate this issue, prevent the ath9k_htc kernel module from loading. This can be achieved by blacklisting the module. Create a file named /etc/modprobe.d/blacklist-ath9k_htc.conf with the following content:

blacklist ath9k_htc

Then, regenerate the initramfs to apply the change:

dracut -f

A system reboot is required for this change to take effect. This mitigation will disable any functionality provided by the ath9k_htc module, which may impact WiFi connectivity if this specific hardware is in use.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelUnder investigation
Red Hat Enterprise Linux 7kernel-rtUnder investigation
Red Hat Enterprise Linux 8kernelFix deferred
Red Hat Enterprise Linux 8kernel-rtFix deferred
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2376096kernel: Linux kernel's ath9k_htc Wi-Fi driver: Denial of Service or information disclosure via malicious USB device input

EPSS

Процентиль: 8%
0.00027
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Abort software beacon handling if disabled A malicious USB device can send a WMI_SWBA_EVENTID event from an ath9k_htc-managed device before beaconing has been enabled. This causes a device-by-zero error in the driver, leading to either a crash or an out of bounds read. Prevent this by aborting the handling in ath9k_htc_swba() if beacons are not enabled.

CVSS3: 7.8
nvd
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Abort software beacon handling if disabled A malicious USB device can send a WMI_SWBA_EVENTID event from an ath9k_htc-managed device before beaconing has been enabled. This causes a device-by-zero error in the driver, leading to either a crash or an out of bounds read. Prevent this by aborting the handling in ath9k_htc_swba() if beacons are not enabled.

CVSS3: 7
msrc
8 месяцев назад

wifi: ath9k_htc: Abort software beacon handling if disabled

CVSS3: 7.8
debian
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 7.8
github
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Abort software beacon handling if disabled A malicious USB device can send a WMI_SWBA_EVENTID event from an ath9k_htc-managed device before beaconing has been enabled. This causes a device-by-zero error in the driver, leading to either a crash or an out of bounds read. Prevent this by aborting the handling in ath9k_htc_swba() if beacons are not enabled.

EPSS

Процентиль: 8%
0.00027
Низкий

6.4 Medium

CVSS3