Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-38656

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-22 Aug, 2025 | 16:00
Updated At-22 Aug, 2025 | 16:00
Rejected At-
Credits

wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start()

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() Preserve the error code if iwl_setup_deferred_work() fails. The current code returns ERR_PTR(0) (which is NULL) on this path. I believe the missing error code potentially leads to a use after free involving debugfs.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:22 Aug, 2025 | 16:00
Updated At:22 Aug, 2025 | 16:00
Rejected At:
▼CVE Numbering Authority (CNA)
wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start()

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() Preserve the error code if iwl_setup_deferred_work() fails. The current code returns ERR_PTR(0) (which is NULL) on this path. I believe the missing error code potentially leads to a use after free involving debugfs.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/intel/iwlwifi/dvm/main.c
Default Status
unaffected
Versions
Affected
  • From c0e43c3f6c0a79381b468574c241065998412b7c before 991e2066f6009d3cb898413058c62dbcc92bd6d2 (git)
  • From 70a1b527eaea9430b1bd87de59f3b9f6bd225701 before 1d068272c21d886d06526454b68368100ba0a720 (git)
  • From 90a0d9f339960448a3acc1437a46730f975efd6a before cf80c02a9fdb6c5bc8508beb6a0f6a1294fc32f6 (git)
  • 6663c52608d8d8727bf1911e6d9218069ba1c85e (git)
  • ca980f1911a7144d451d1c31298ab8507c6bd88f (git)
  • 7dd6350307af6521b6240b295c93b7eec4daebe6 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/intel/iwlwifi/dvm/main.c
Default Status
unaffected
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/991e2066f6009d3cb898413058c62dbcc92bd6d2
N/A
https://git.kernel.org/stable/c/1d068272c21d886d06526454b68368100ba0a720
N/A
https://git.kernel.org/stable/c/cf80c02a9fdb6c5bc8508beb6a0f6a1294fc32f6
N/A
Hyperlink: https://git.kernel.org/stable/c/991e2066f6009d3cb898413058c62dbcc92bd6d2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1d068272c21d886d06526454b68368100ba0a720
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cf80c02a9fdb6c5bc8508beb6a0f6a1294fc32f6
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:22 Aug, 2025 | 16:15
Updated At:22 Aug, 2025 | 18:08

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() Preserve the error code if iwl_setup_deferred_work() fails. The current code returns ERR_PTR(0) (which is NULL) on this path. I believe the missing error code potentially leads to a use after free involving debugfs.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
CPE Matches

Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/1d068272c21d886d06526454b68368100ba0a720416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/991e2066f6009d3cb898413058c62dbcc92bd6d2416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/cf80c02a9fdb6c5bc8508beb6a0f6a1294fc32f6416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
Hyperlink: https://git.kernel.org/stable/c/1d068272c21d886d06526454b68368100ba0a720
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/991e2066f6009d3cb898413058c62dbcc92bd6d2
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cf80c02a9fdb6c5bc8508beb6a0f6a1294fc32f6
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found