CVE-2025-23133 — Out-of-bounds Write in Linux
CWE-787 — Out-of-bounds WriteCWE-125 — Out-of-bounds ReadCWE-362 — Race Condition30 documents7 sources
Severity
7.8HIGHNVD
OSV3.2
EPSS
0.1%
top 75.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 16
Latest updateApr 9
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: update channel list in reg notifier instead reg worker
Currently when ath11k gets a new channel list, it will be processed
according to the following steps:
1. update new channel list to cfg80211 and queue reg_work.
2. cfg80211 handles new channel list during reg_work.
3. update cfg80211's handled channel list to firmware by
ath11k_reg_update_chan_list().
But ath11k will immediately execute step 3 after reg_work…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages13 packages
▶CVEListV5linux/linuxf45cb6b29cd36514e13f7519770873d8c0457008 — 26618c039b78a76c373d4e02c5fbd52e3a73aead+5