In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Clear affinity hint before calling ath12kpcifree_irq() in error path
If a shared IRQ is used by the driver due to platform limitation, then the IRQ affinity hint is set right after the allocation of IRQ vectors in ath12kpcimsi_alloc(). This does no harm unless one of the functions requesting the IRQ fails and attempt to free the IRQ.
This may end up with a warning from the IRQ core that is expecting the affinity hint to be cleared before freeing the IRQ:
kernel/irq/manage.c:
/* make sure affinity_hint is cleaned up */
if (WARN_ON_ONCE(desc->affinity_hint))
desc->affinity_hint = NULL;
So to fix this issue, clear the IRQ affinity hint before calling ath12kpcifree_irq() in the error path. The affinity will be cleared once again further down the error path due to code organization, but that does no harm.
[
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b43b1e2c52db77c872bd60d30cdcc72c47df70c7",
"signature_type": "Line",
"id": "CVE-2025-22128-196d89f2",
"target": {
"file": "drivers/net/wireless/ath/ath12k/pci.c"
},
"digest": {
"line_hashes": [
"296312118433286293543598995551842562294",
"257918808405762005607196488298766785828",
"210625730679505667699140263732515872649",
"141805439908375770029242085495363420414"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35b33ba76765ce9e72949d957f3cf1feafd2955c",
"signature_type": "Line",
"id": "CVE-2025-22128-22957308",
"target": {
"file": "drivers/net/wireless/ath/ath12k/pci.c"
},
"digest": {
"line_hashes": [
"296312118433286293543598995551842562294",
"257918808405762005607196488298766785828",
"210625730679505667699140263732515872649",
"141805439908375770029242085495363420414"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35b33ba76765ce9e72949d957f3cf1feafd2955c",
"signature_type": "Function",
"id": "CVE-2025-22128-41fc0270",
"target": {
"function": "ath12k_pci_probe",
"file": "drivers/net/wireless/ath/ath12k/pci.c"
},
"digest": {
"length": 3699.0,
"function_hash": "228951906151074783048881014282449035281"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b43b1e2c52db77c872bd60d30cdcc72c47df70c7",
"signature_type": "Function",
"id": "CVE-2025-22128-4a4a7412",
"target": {
"function": "ath12k_pci_probe",
"file": "drivers/net/wireless/ath/ath12k/pci.c"
},
"digest": {
"length": 3746.0,
"function_hash": "90860067363826801576553278947151487526"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a69a594794fcad96d4cfce12aab6c5014a12b4c8",
"signature_type": "Function",
"id": "CVE-2025-22128-94dc7663",
"target": {
"function": "ath12k_pci_probe",
"file": "drivers/net/wireless/ath/ath12k/pci.c"
},
"digest": {
"length": 3699.0,
"function_hash": "108739187087532081202458766834744397571"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a69a594794fcad96d4cfce12aab6c5014a12b4c8",
"signature_type": "Line",
"id": "CVE-2025-22128-c14f8497",
"target": {
"file": "drivers/net/wireless/ath/ath12k/pci.c"
},
"digest": {
"line_hashes": [
"296312118433286293543598995551842562294",
"257918808405762005607196488298766785828",
"210625730679505667699140263732515872649",
"141805439908375770029242085495363420414"
],
"threshold": 0.9
},
"deprecated": false
}
]