CVE-2025-38601
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
| linux | linux_kernel | 5.10.244-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ath11k WiFi driver. It involves a failure to clear an 'initialized' flag for certain data structures (srng lists) when they are deinitialized during crash recovery. As a result, when the system resumes and attempts to dump statistics for these lists, it encounters stale flags and tries to access invalid memory, causing a kernel page fault and kernel panic.
How can this vulnerability impact me? :
The vulnerability can cause kernel panics on system resume, leading to system instability and crashes. This can disrupt normal operation, cause data loss, and require system reboots, impacting availability and reliability of systems using the affected Linux kernel with the ath11k driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific ath11k error messages and kernel panics related to the ath11k driver. Look for messages such as 'failed to receive control response completion, polling..', 'Service connect timeout', 'failed to connect to HTT: -110', 'firmware crashed: MHI_CB_EE_RDDM', and kernel oops or page fault errors referencing ath11k_hal_dump_srng_stats. Commands to check these logs include: 'dmesg | grep ath11k' and 'journalctl -k | grep ath11k'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by clearing the initialized flag in ath11k_hal_srng_deinit(). Until an update is applied, monitoring for the described kernel panic symptoms and avoiding system suspend/resume cycles that trigger the bug may reduce risk.