CVE-2025-38643

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() Callers of wdev_chandef() must hold the wiphy mutex. But the worker cfg80211_propagate_cac_done_wk() never takes the lock. Which triggers the warning below with the mesh_peer_connected_dfs test from hostapd and not (yet) released mac80211 code changes: WARNING: CPU: 0 PID: 495 at net/wireless/chan.c:1552 wdev_chandef+0x60/0x165 Modules linked in: CPU: 0 UID: 0 PID: 495 Comm: kworker/u4:2 Not tainted 6.14.0-rc5-wt-g03960e6f9d47 #33 13c287eeabfe1efea01c0bcc863723ab082e17cf Workqueue: cfg80211 cfg80211_propagate_cac_done_wk Stack: 00000000 00000001 ffffff00 6093267c 00000000 6002ec30 6d577c50 60037608 00000000 67e8d108 6063717b 00000000 Call Trace: [<6002ec30>] ? _printk+0x0/0x98 [<6003c2b3>] show_stack+0x10e/0x11a [<6002ec30>] ? _printk+0x0/0x98 [<60037608>] dump_stack_lvl+0x71/0xb8 [<6063717b>] ? wdev_chandef+0x60/0x165 [<6003766d>] dump_stack+0x1e/0x20 [<6005d1b7>] __warn+0x101/0x20f [<6005d3a8>] warn_slowpath_fmt+0xe3/0x15d [<600b0c5c>] ? mark_lock.part.0+0x0/0x4ec [<60751191>] ? __this_cpu_preempt_check+0x0/0x16 [<600b11a2>] ? mark_held_locks+0x5a/0x6e [<6005d2c5>] ? warn_slowpath_fmt+0x0/0x15d [<60052e53>] ? unblock_signals+0x3a/0xe7 [<60052f2d>] ? um_set_signals+0x2d/0x43 [<60751191>] ? __this_cpu_preempt_check+0x0/0x16 [<607508b2>] ? lock_is_held_type+0x207/0x21f [<6063717b>] wdev_chandef+0x60/0x165 [<605f89b4>] regulatory_propagate_dfs_state+0x247/0x43f [<60052f00>] ? um_set_signals+0x0/0x43 [<605e6bfd>] cfg80211_propagate_cac_done_wk+0x3a/0x4a [<6007e460>] process_scheduled_works+0x3bc/0x60e [<6007d0ec>] ? move_linked_works+0x4d/0x81 [<6007d120>] ? assign_work+0x0/0xaa [<6007f81f>] worker_thread+0x220/0x2dc [<600786ef>] ? set_pf_worker+0x0/0x57 [<60087c96>] ? to_kthread+0x0/0x43 [<6008ab3c>] kthread+0x2d3/0x2e2 [<6007f5ff>] ? worker_thread+0x0/0x2dc [<6006c05b>] ? calculate_sigpending+0x0/0x56 [<6003b37d>] new_thread_handler+0x4a/0x64 irq event stamp: 614611 hardirqs last enabled at (614621): [<00000000600bc96b>] __up_console_sem+0x82/0xaf hardirqs last disabled at (614630): [<00000000600bc92c>] __up_console_sem+0x43/0xaf softirqs last enabled at (614268): [<00000000606c55c6>] __ieee80211_wake_queue+0x933/0x985 softirqs last disabled at (614266): [<00000000606c52d6>] __ieee80211_wake_queue+0x643/0x985
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.5:rc7:*:*:*:*:*:*

History

01 Dec 2025, 19:14

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.5:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-667
References () https://git.kernel.org/stable/c/2c5dee15239f3f3e31aa5c8808f18996c039e2c1 - () https://git.kernel.org/stable/c/2c5dee15239f3f3e31aa5c8808f18996c039e2c1 - Patch
References () https://git.kernel.org/stable/c/4a63523d3541eef4cf504a9682e6fbe94ffe79a6 - () https://git.kernel.org/stable/c/4a63523d3541eef4cf504a9682e6fbe94ffe79a6 - Patch
References () https://git.kernel.org/stable/c/7022df2248c08c6f75a01714163ac902333bf3db - () https://git.kernel.org/stable/c/7022df2248c08c6f75a01714163ac902333bf3db - Patch
References () https://git.kernel.org/stable/c/b3d24038eb775f2f7a1dfef58d8e1dc444a12820 - () https://git.kernel.org/stable/c/b3d24038eb775f2f7a1dfef58d8e1dc444a12820 - Patch
References () https://git.kernel.org/stable/c/dbce810607726408f889d3358f4780fd1436861e - () https://git.kernel.org/stable/c/dbce810607726408f889d3358f4780fd1436861e - Patch

01 Dec 2025, 11:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/b3d24038eb775f2f7a1dfef58d8e1dc444a12820 -

02 Nov 2025, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/4a63523d3541eef4cf504a9682e6fbe94ffe79a6 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: Se ha añadido un bloqueo faltante en cfg80211_check_and_end_cac(). Quienes llaman a wdev_chandef() deben mantener el mutex de wiphy. Sin embargo, el trabajador cfg80211_propagate_cac_done_wk() nunca asume el bloqueo. Lo que activa la advertencia a continuación con la prueba mesh_peer_connected_dfs de hostapd y los cambios de código mac80211 no publicados (aún): ADVERTENCIA: CPU: 0 PID: 495 en net/wireless/chan.c:1552 wdev_chandef+0x60/0x165 Módulos vinculados: CPU: 0 UID: 0 PID: 495 Comm: kworker/u4:2 No contaminado 6.14.0-rc5-wt-g03960e6f9d47 #33 13c287eeabfe1efea01c0bcc863723ab082e17cf Cola de trabajo: cfg80211 cfg80211_propagate_cac_done_wk Pila: 00000000 00000001 ffffff00 6093267c 00000000 6002ec30 6d577c50 60037608 00000000 67e8d108 6063717b 00000000 Rastreo de llamadas: [&lt;6002ec30&gt;] ? _printk+0x0/0x98 [&lt;6003c2b3&gt;] show_stack+0x10e/0x11a [&lt;6002ec30&gt;] ? _printk+0x0/0x98 [&lt;60037608&gt;] dump_stack_lvl+0x71/0xb8 [&lt;6063717b&gt;] ? __warn+0x101/0x20f [&lt;6005d3a8&gt;] warn_slowpath_fmt+0xe3/0x15d [&lt;600b0c5c&gt;] ? mark_lock.part.0+0x0/0x4ec [&lt;60751191&gt;] ? __this_cpu_preempt_check+0x0/0x16 [&lt;600b11a2&gt;] ? mark_held_locks+0x5a/0x6e [&lt;6005d2c5&gt;] ? warn_slowpath_fmt+0x0/0x15d [&lt;60052e53&gt;] ? unblock_signals+0x3a/0xe7 [&lt;60052f2d&gt;] ? um_set_signals+0x2d/0x43 [&lt;60751191&gt;] ? __this_cpu_preempt_check+0x0/0x16 [&lt;607508b2&gt;] ? lock_is_held_type+0x207/0x21f [&lt;6063717b&gt;] wdev_chandef+0x60/0x165 [&lt;605f89b4&gt;] regulatory_propagate_dfs_state+0x247/0x43f [&lt;60052f00&gt;] ? um_set_signals+0x0/0x43 [&lt;605e6bfd&gt;] cfg80211_propagate_cac_done_wk+0x3a/0x4a [&lt;6007e460&gt;] proceso_trabajos_programados+0x3bc/0x60e [&lt;6007d0ec&gt;] ? mover_trabajos_vinculados+0x4d/0x81 [&lt;6007d120&gt;] ? asignar_trabajo+0x0/0xaa [&lt;6007f81f&gt;] subproceso_trabajador+0x220/0x2dc [&lt;600786ef&gt;] ? establecer_pf_trabajador+0x0/0x57 [&lt;60087c96&gt;] ? hilo_trabajador+0x0/0x2dc [&lt;6006c05b&gt;] ? calculate_sigpending+0x0/0x56 [&lt;6003b37d&gt;] new_thread_handler+0x4a/0x64 marca de evento de irq: 614611 hardirqs habilitados por última vez en (614621): [&lt;00000000600bc96b&gt;] __up_console_sem+0x82/0xaf hardirqs deshabilitados por última vez en (614630): [&lt;00000000600bc92c&gt;] __up_console_sem+0x43/0xaf softirqs habilitados por última vez en (614268): [&lt;00000000606c55c6&gt;] __ieee80211_wake_queue+0x933/0x985 softirqs deshabilitados por última vez en (614266): [&lt;00000000606c52d6&gt;] __ieee80211_wake_queue+0x643/0x985

22 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 16:15

Updated : 2025-12-01 19:14


NVD link : CVE-2025-38643

Mitre link : CVE-2025-38643

CVE.ORG link : CVE-2025-38643


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking