VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68182

CVE-2025-68182

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()

This code frees "link" by calling kfree_rcu(link, rcu_head) and then it dereferences "link" to get the "link->fw_id". Save the "link->fw_id" first to avoid a potential use after free.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In iwlwifi, a use-after-free in iwl_mld_remove_link() due to accessing link->fw_id after kfree_rcu can lead to memory corruption; fixed by saving fw_id first.

Bug

In the Linux kernel's iwlwifi driver, function iwl_mld_remove_link() frees the link structure via kfree_rcu(link, rcu_head) and then immediately dereferences link->fw_id to use it after the memory has been freed. This creates a potential use-after-free condition, where the freed memory could be reallocated by another thread, leading to corruption or exploitation.

Exploitation

The vulnerability is triggered during driver link teardown operations. An attacker would need local access to the system and the ability to influence wireless operations or trigger the specific code path. The bug is in kernel-level code, so no user interaction beyond normal usage is required, but it is not directly exploitable from user space without additional conditions.

Impact

A use-after-free can result in memory corruption, system crashes, or potentially arbitrary code execution at the kernel level. An attacker who successfully exploits this could gain elevated privileges, cause denial of service, or bypass security mechanisms.

Mitigation

The fix, committed to the kernel stable tree [1], saves link->fw_id into a local variable before freeing link, eliminating the use-after-free. The patch is included in mainline and stable kernel updates. Users should apply the latest kernel updates to address this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.