CVE-2025-38293
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2025
Last modified:
18/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath11k: fix node corruption in ar->arvifs list<br />
<br />
In current WLAN recovery code flow, ath11k_core_halt() only<br />
reinitializes the "arvifs" list head. This will cause the<br />
list node immediately following the list head to become an<br />
invalid list node. Because the prev of that node still points<br />
to the list head "arvifs", but the next of the list head "arvifs"<br />
no longer points to that list node.<br />
<br />
When a WLAN recovery occurs during the execution of a vif<br />
removal, and it happens before the spin_lock_bh(&ar->data_lock)<br />
in ath11k_mac_op_remove_interface(), list_del() will detect the<br />
previously mentioned situation, thereby triggering a kernel panic.<br />
<br />
The fix is to remove and reinitialize all vif list nodes from the<br />
list head "arvifs" during WLAN halt. The reinitialization is to make<br />
the list nodes valid, ensuring that the list_del() in<br />
ath11k_mac_op_remove_interface() can execute normally.<br />
<br />
Call trace:<br />
__list_del_entry_valid_or_report+0xb8/0xd0<br />
ath11k_mac_op_remove_interface+0xb0/0x27c [ath11k]<br />
drv_remove_interface+0x48/0x194 [mac80211]<br />
ieee80211_do_stop+0x6e0/0x844 [mac80211]<br />
ieee80211_stop+0x44/0x17c [mac80211]<br />
__dev_close_many+0xac/0x150<br />
__dev_change_flags+0x194/0x234<br />
dev_change_flags+0x24/0x6c<br />
devinet_ioctl+0x3a0/0x670<br />
inet_ioctl+0x200/0x248<br />
sock_do_ioctl+0x60/0x118<br />
sock_ioctl+0x274/0x35c<br />
__arm64_sys_ioctl+0xac/0xf0<br />
invoke_syscall+0x48/0x114<br />
...<br />
<br />
Tested-on: QCA6698AQ hw2.1 PCI WLAN.HSP.1.1-04591-QCAHSPSWPL_V1_V2_SILICONZ_IOE-1
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.94 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.3 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/31e98e277ae47f56632e4d663b1d4fd12ba33ea8
- https://git.kernel.org/stable/c/6c139015b597e570dd5962934e9f9a2f4cc8ef48
- https://git.kernel.org/stable/c/6d6cb27fe146061f2512e904618f5e005bb7bb6a
- https://git.kernel.org/stable/c/b0974ed82e6ad5ff246fd90a5b14f3e7be4f2924
- https://git.kernel.org/stable/c/f50ba7e7b607f2d00618799312e7fdb76a1ff48e
- https://git.kernel.org/stable/c/f5d77d0d41ea7a204d47288d0cf0404a52b5890e
- https://git.kernel.org/stable/c/f9507cf2dd0e1ed5028c0e8240da6fe5fd3110d3
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



