CVE-2025-38513

In the Linux kernel, the following vulnerability has been resolved: wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() There is a potential NULL pointer dereference in zd_mac_tx_to_dev(). For example, the following is possible: T0 T1 zd_mac_tx_to_dev() /* len == skb_queue_len(q) */ while (len > ZD_MAC_MAX_ACK_WAITERS) { filter_ack() spin_lock_irqsave(&q->lock, flags); /* position == skb_queue_len(q) */ for (i=1; i<position; i++) skb = __skb_dequeue(q) if (mac->type == NL80211_IFTYPE_AP) skb = __skb_dequeue(q); spin_unlock_irqrestore(&q->lock, flags); skb_dequeue() -> NULL Since there is a small gap between checking skb queue length and skb being unconditionally dequeued in zd_mac_tx_to_dev(), skb_dequeue() can return NULL. Then the pointer is passed to zd_mac_tx_status() where it is dereferenced. In order to avoid potential NULL pointer dereference due to situations like above, check if skb is not NULL before passing it to zd_mac_tx_status(). Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 17:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/014c34dc132015c4f918ada4982e952947ac1047 - () https://git.kernel.org/stable/c/014c34dc132015c4f918ada4982e952947ac1047 - Patch
References () https://git.kernel.org/stable/c/5420de65efbeb6503bcf1d43451c9df67ad60298 - () https://git.kernel.org/stable/c/5420de65efbeb6503bcf1d43451c9df67ad60298 - Patch
References () https://git.kernel.org/stable/c/602b4eb2f25668de15de69860ec99caf65b3684d - () https://git.kernel.org/stable/c/602b4eb2f25668de15de69860ec99caf65b3684d - Patch
References () https://git.kernel.org/stable/c/74b1ec9f5d627d2bdd5e5b6f3f81c23317657023 - () https://git.kernel.org/stable/c/74b1ec9f5d627d2bdd5e5b6f3f81c23317657023 - Patch
References () https://git.kernel.org/stable/c/adf08c96b963c7cd7ec1ee1c0c556228d9bedaae - () https://git.kernel.org/stable/c/adf08c96b963c7cd7ec1ee1c0c556228d9bedaae - Patch
References () https://git.kernel.org/stable/c/b24f65c184540dfb967479320ecf7e8c2e9220dc - () https://git.kernel.org/stable/c/b24f65c184540dfb967479320ecf7e8c2e9220dc - Patch
References () https://git.kernel.org/stable/c/c1958270de947604cc6de05fc96dbba256b49cf0 - () https://git.kernel.org/stable/c/c1958270de947604cc6de05fc96dbba256b49cf0 - Patch
References () https://git.kernel.org/stable/c/fcd9c923b58e86501450b9b442ccc7ce4a8d0fda - () https://git.kernel.org/stable/c/fcd9c923b58e86501450b9b442ccc7ce4a8d0fda - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

18 Aug 2025, 20:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: zd1211rw: Se corrige una posible desreferencia de puntero NULL en zd_mac_tx_to_dev(). Existe una posible desreferencia de puntero NULL en zd_mac_tx_to_dev(). Por ejemplo, es posible lo siguiente: T0 T1 zd_mac_tx_to_dev() /* len == skb_queue_len(q) */ while (len &gt; ZD_MAC_MAX_ACK_WAITERS) { filter_ack() spin_lock_irqsave(&amp;q-&gt;lock, flags); /* position == skb_queue_len(q) */ for (i=1; itype == NL80211_IFTYPE_AP) skb = __skb_dequeue(q); spin_unlock_irqrestore(&amp;q-&gt;lock, flags); skb_dequeue() -&gt; NULL. Dado que hay una pequeña diferencia entre la comprobación de la longitud de la cola de skb y su desencolado incondicional en zd_mac_tx_to_dev(), skb_dequeue() puede devolver NULL. A continuación, el puntero se pasa a zd_mac_tx_status(), donde se desreferencia. Para evitar posibles desreferencias de punteros NULL debido a situaciones como la anterior, compruebe que skb no sea NULL antes de pasarlo a zd_mac_tx_status(). Encontrado por el Centro de Verificación de Linux (linuxtesting.org) con SVACE.

16 Aug 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-16 11:15

Updated : 2026-01-07 17:47


NVD link : CVE-2025-38513

Mitre link : CVE-2025-38513

CVE.ORG link : CVE-2025-38513


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference