Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-38293— wifi: ath11k: fix node corruption in ar->arvifs list

EPSS 0.11% · P29

Affected Version Matrix 16

VendorProductVersion RangeStatus
LinuxLinuxd5c65159f2895379e11ca13f62feabe93278985d< 6c139015b597e570dd5962934e9f9a2f4cc8ef48affected
d5c65159f2895379e11ca13f62feabe93278985d< f9507cf2dd0e1ed5028c0e8240da6fe5fd3110d3affected
d5c65159f2895379e11ca13f62feabe93278985d< b0974ed82e6ad5ff246fd90a5b14f3e7be4f2924affected
d5c65159f2895379e11ca13f62feabe93278985d< f50ba7e7b607f2d00618799312e7fdb76a1ff48eaffected
d5c65159f2895379e11ca13f62feabe93278985d< f5d77d0d41ea7a204d47288d0cf0404a52b5890eaffected
d5c65159f2895379e11ca13f62feabe93278985d< 6d6cb27fe146061f2512e904618f5e005bb7bb6aaffected
d5c65159f2895379e11ca13f62feabe93278985d< 31e98e277ae47f56632e4d663b1d4fd12ba33ea8affected
5.6affected
… +8 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-38293

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
wifi: ath11k: fix node corruption in ar->arvifs list
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix node corruption in ar->arvifs list In current WLAN recovery code flow, ath11k_core_halt() only reinitializes the "arvifs" list head. This will cause the list node immediately following the list head to become an invalid list node. Because the prev of that node still points to the list head "arvifs", but the next of the list head "arvifs" no longer points to that list node. When a WLAN recovery occurs during the execution of a vif removal, and it happens before the spin_lock_bh(&ar->data_lock) in ath11k_mac_op_remove_interface(), list_del() will detect the previously mentioned situation, thereby triggering a kernel panic. The fix is to remove and reinitialize all vif list nodes from the list head "arvifs" during WLAN halt. The reinitialization is to make the list nodes valid, ensuring that the list_del() in ath11k_mac_op_remove_interface() can execute normally. Call trace: __list_del_entry_valid_or_report+0xb8/0xd0 ath11k_mac_op_remove_interface+0xb0/0x27c [ath11k] drv_remove_interface+0x48/0x194 [mac80211] ieee80211_do_stop+0x6e0/0x844 [mac80211] ieee80211_stop+0x44/0x17c [mac80211] __dev_close_many+0xac/0x150 __dev_change_flags+0x194/0x234 dev_change_flags+0x24/0x6c devinet_ioctl+0x3a0/0x670 inet_ioctl+0x200/0x248 sock_do_ioctl+0x60/0x118 sock_ioctl+0x274/0x35c __arm64_sys_ioctl+0xac/0xf0 invoke_syscall+0x48/0x114 ... Tested-on: QCA6698AQ hw2.1 PCI WLAN.HSP.1.1-04591-QCAHSPSWPL_V1_V2_SILICONZ_IOE-1
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于WLAN恢复期间arvifs列表节点损坏,可能导致内核崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux d5c65159f2895379e11ca13f62feabe93278985d ~ 6c139015b597e570dd5962934e9f9a2f4cc8ef48 -
LinuxLinux 5.6 -

II. Public POCs for CVE-2025-38293

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-38293

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-07-10 · 84 CVEs total

CVE-2025-38317wifi: ath12k: Fix buffer overflow in debugfs
CVE-2025-38328jffs2: check jffs2_prealloc_raw_node_refs() result in few other places
CVE-2025-38316wifi: mt76: mt7996: avoid NULL pointer dereference in mt7996_set_monitor()
CVE-2025-38315Bluetooth: btintel: Check dsbr size from EFI variable
CVE-2025-38314virtio-pci: Fix result size returned for the admin command completion
CVE-2025-38311iavf: get rid of the crit lock
CVE-2025-38310seg6: Fix validation of nexthop addresses
CVE-2025-38309drm/xe/vm: move xe_svm_init() earlier
CVE-2025-38308ASoC: Intel: avs: Fix possible null-ptr-deref when initing hw
CVE-2025-38313bus: fsl-mc: fix double-free on mc_dev
CVE-2025-38318perf: arm-ni: Fix missing platform_set_drvdata()
CVE-2025-38319drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table
CVE-2025-38320arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth()
CVE-2025-38321smb: Log an error when close_all_cached_dirs fails
CVE-2025-38322perf/x86/intel: Fix crash in icl_update_topdown_event()
CVE-2025-38323net: atm: add lec_mutex
CVE-2025-38324mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().
CVE-2025-38325ksmbd: add free_transport ops in ksmbd connection
CVE-2025-38326aoe: clean device rq_list in aoedev_downdev()
CVE-2025-38327fgraph: Do not enable function_graph tracer when setting funcgraph-args

Showing top 20 of 84 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-38293

No comments yet


Leave a comment