CVE-2025-39890

EUVD-2025-30959
In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event

Currently, in ath12k_service_ready_ext_event(), svc_rdy_ext.mac_phy_caps
is not freed in the failure case, causing a memory leak. The following
trace is observed in kmemleak:

unreferenced object 0xffff8b3eb5789c00 (size 1024):
 comm "softirq", pid 0, jiffies 4294942577
 hex dump (first 32 bytes):
   00 00 00 00 01 00 00 00 00 00 00 00 7b 00 00 10  ............{...
   01 00 00 00 00 00 00 00 01 00 00 00 1f 38 00 00  .............8..
 backtrace (crc 44e1c357):
   __kmalloc_noprof+0x30b/0x410
   ath12k_wmi_mac_phy_caps_parse+0x84/0x100 [ath12k]
   ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k]
   ath12k_wmi_svc_rdy_ext_parse+0x308/0x4c0 [ath12k]
   ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k]
   ath12k_service_ready_ext_event.isra.0+0x44/0xd0 [ath12k]
   ath12k_wmi_op_rx+0x2eb/0xd70 [ath12k]
   ath12k_htc_rx_completion_handler+0x1f4/0x330 [ath12k]
   ath12k_ce_recv_process_cb+0x218/0x300 [ath12k]
   ath12k_pci_ce_workqueue+0x1b/0x30 [ath12k]
   process_one_work+0x219/0x680
   bh_worker+0x198/0x1f0
   tasklet_action+0x13/0x30
   handle_softirqs+0xca/0x460
   __irq_exit_rcu+0xbe/0x110
   irq_exit_rcu+0x9/0x30

Free svc_rdy_ext.mac_phy_caps in the error case to fix this memory leak.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
6.3 ≤
𝑥
< 6.6.94
linuxlinux_kernel
6.7 ≤
𝑥
< 6.12.34
linuxlinux_kernel
6.13 ≤
𝑥
< 6.15.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.170-3
fixed
bookworm (security)
6.1.172-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.251-5
fixed
forky
7.0.7-1
fixed
sid
7.0.7-1
fixed
trixie
6.12.86-1
fixed
trixie (security)
6.12.88-1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
dlm-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
gfs2-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
kernel-64kb
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1
fixed
kernel-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.15.2
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.15.2
fixed
kernel-default
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1
fixed
kernel-default-base
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1.150700.17.13.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1.150700.17.13.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1.150600.12.38.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1.150700.17.13.1
fixed
kernel-docs
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1
fixed
kernel-macros
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1
fixed
kernel-obs-build
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1
fixed
kernel-source
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1
fixed
kernel-source-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.15.2
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.15.2
fixed
kernel-syms
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1
fixed
kernel-syms-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.15.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.15.1
fixed
kernel-zfcpdump
suse enterprise desktop 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.19.1
fixed
ocfs2-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
reiserfs-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed