rhsa-2025:9068
Vulnerability from csaf_redhat
Published
2025-06-16 01:52
Modified
2025-07-29 05:02
Summary
Red Hat Security Advisory: kpatch-patch-5_14_0-570_17_1 security update

Notes

Topic
An update for kpatch-patch-5_14_0-570_17_1 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-5.14.0-570.17.1.el9_6. Security Fix(es): * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kpatch-patch-5_14_0-570_17_1 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel.  This patch module is targeted for kernel-5.14.0-570.17.1.el9_6.\n\nSecurity Fix(es):\n\n* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:9068",
        "url": "https://access.redhat.com/errata/RHSA-2025:9068"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2367748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_9068.json"
      }
    ],
    "title": "Red Hat Security Advisory: kpatch-patch-5_14_0-570_17_1 security update",
    "tracking": {
      "current_release_date": "2025-07-29T05:02:45+00:00",
      "generator": {
        "date": "2025-07-29T05:02:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.4"
        }
      },
      "id": "RHSA-2025:9068",
      "initial_release_date": "2025-06-16T01:52:52+00:00",
      "revision_history": [
        {
          "date": "2025-06-16T01:52:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-06-16T01:52:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-07-29T05:02:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.6.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src",
                "product": {
                  "name": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src",
                  "product_id": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-570_17_1@1-1.el9_6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64",
                "product": {
                  "name": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64",
                  "product_id": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-570_17_1@1-1.el9_6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64",
                "product": {
                  "name": "kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64",
                  "product_id": "kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-570_17_1-debugsource@1-1.el9_6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64",
                "product": {
                  "name": "kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64",
                  "product_id": "kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-570_17_1-debuginfo@1-1.el9_6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src"
        },
        "product_reference": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64"
        },
        "product_reference": "kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64"
        },
        "product_reference": "kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64"
        },
        "product_reference": "kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64",
        "relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-37943",
      "cwe": {
        "id": "CWE-253",
        "name": "Incorrect Check of Function Return Value"
      },
      "discovery_date": "2025-05-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2367748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the Linux kernel\u0027s driver for Qualcomm Atheros Wi-fi 7 driver (ath12k). An attacker with the ability to generate real or simulated network traffic could exploit this vulnerability to modify kernel memory, leading to a denial of service, compromised system integrity, or an elevation of privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability in the ath12k driver can be exploited when hardware which uses that driver provides malformed packets, specifically packets with a header length longer than permitted by the Wi-Fi specification. An attacker who can generate packets to be processed by this driver could exploit this flaw to alter kernel memory, resulting in the ability to escalate their privileges or otherwise compromise system integrity and stability.\n\nThese drivers are not included in Red Hat Enterprise Linux prior to 9.6, so those systems are unaffected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src",
          "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64",
          "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-37943"
        },
        {
          "category": "external",
          "summary": "RHBZ#2367748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-37943",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-37943",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37943"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025052043-CVE-2025-37943-9cf8@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025052043-CVE-2025-37943-9cf8@gregkh/T"
        }
      ],
      "release_date": "2025-05-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-06-16T01:52:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:9068"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the `ath12k` module from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically. Note that this will make hardware that uses that chipset unavailable, so this mitigation is not suitable for systems that rely on Qualcomm Wi-Fi 7 network adapters.",
          "product_ids": [
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.src",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-0:1-1.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debuginfo-0:1-1.el9_6.x86_64",
            "BaseOS-9.6.0.Z.MAIN.EUS:kpatch-patch-5_14_0-570_17_1-debugsource-0:1-1.el9_6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…