CVE-2025-38293

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38293
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38293.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38293
Downstream
Related
Published
2025-07-10T07:42:08.230Z
Modified
2025-11-28T02:34:59.677527Z
Summary
wifi: ath11k: fix node corruption in ar->arvifs list
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix node corruption in ar->arvifs list

In current WLAN recovery code flow, ath11kcorehalt() only reinitializes the "arvifs" list head. This will cause the list node immediately following the list head to become an invalid list node. Because the prev of that node still points to the list head "arvifs", but the next of the list head "arvifs" no longer points to that list node.

When a WLAN recovery occurs during the execution of a vif removal, and it happens before the spinlockbh(&ar->datalock) in ath11kmacopremoveinterface(), listdel() will detect the previously mentioned situation, thereby triggering a kernel panic.

The fix is to remove and reinitialize all vif list nodes from the list head "arvifs" during WLAN halt. The reinitialization is to make the list nodes valid, ensuring that the listdel() in ath11kmacopremove_interface() can execute normally.

Call trace: _listdelentryvalidorreport+0xb8/0xd0 ath11kmacopremoveinterface+0xb0/0x27c [ath11k] drvremoveinterface+0x48/0x194 [mac80211] ieee80211dostop+0x6e0/0x844 [mac80211] ieee80211stop+0x44/0x17c [mac80211] _devclosemany+0xac/0x150 _devchangeflags+0x194/0x234 devchangeflags+0x24/0x6c devinetioctl+0x3a0/0x670 inetioctl+0x200/0x248 sockdoioctl+0x60/0x118 sockioctl+0x274/0x35c _arm64sysioctl+0xac/0xf0 invokesyscall+0x48/0x114 ...

Tested-on: QCA6698AQ hw2.1 PCI WLAN.HSP.1.1-04591-QCAHSPSWPLV1V2SILICONZIOE-1

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38293.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d5c65159f2895379e11ca13f62feabe93278985d
Fixed
6c139015b597e570dd5962934e9f9a2f4cc8ef48
Fixed
f9507cf2dd0e1ed5028c0e8240da6fe5fd3110d3
Fixed
b0974ed82e6ad5ff246fd90a5b14f3e7be4f2924
Fixed
f50ba7e7b607f2d00618799312e7fdb76a1ff48e
Fixed
f5d77d0d41ea7a204d47288d0cf0404a52b5890e
Fixed
6d6cb27fe146061f2512e904618f5e005bb7bb6a
Fixed
31e98e277ae47f56632e4d663b1d4fd12ba33ea8

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6.0
Fixed
5.10.239
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.186
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.142
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.94
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.34
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.3