In the Linux kernel, the following vulnerability has been resolved:
wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()
There is a potential NULL pointer dereference in zd_mac_tx_to_dev(). For
example, the following is possible:
T0 T1
zd_mac_tx_to_dev()
/* len == skb_queue_len(q) */
while (len > ZD_MAC_MAX_ACK_WAITERS) {
filter_ack()
spin_lock_irqsave(&q->lock, flags);
/* position == skb_queue_len(q) */
for (i=1; i<position; i++)
skb = __skb_dequeue(q)
if (mac->type == NL80211_IFTYPE_AP)
skb = __skb_dequeue(q);
spin_unlock_irqrestore(&q->lock, flags);
skb_dequeue() -> NULL
Since there is a small gap between checking skb queue length and skb being
unconditionally dequeued in zd_mac_tx_to_dev(), skb_dequeue() can return NULL.
Then the pointer is passed to zd_mac_tx_status() where it is dereferenced.
In order to avoid potential NULL pointer dereference due to situations like
above, check if skb is not NULL before passing it to zd_mac_tx_status().
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2026, 17:47
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/014c34dc132015c4f918ada4982e952947ac1047 - Patch | |
| References | () https://git.kernel.org/stable/c/5420de65efbeb6503bcf1d43451c9df67ad60298 - Patch | |
| References | () https://git.kernel.org/stable/c/602b4eb2f25668de15de69860ec99caf65b3684d - Patch | |
| References | () https://git.kernel.org/stable/c/74b1ec9f5d627d2bdd5e5b6f3f81c23317657023 - Patch | |
| References | () https://git.kernel.org/stable/c/adf08c96b963c7cd7ec1ee1c0c556228d9bedaae - Patch | |
| References | () https://git.kernel.org/stable/c/b24f65c184540dfb967479320ecf7e8c2e9220dc - Patch | |
| References | () https://git.kernel.org/stable/c/c1958270de947604cc6de05fc96dbba256b49cf0 - Patch | |
| References | () https://git.kernel.org/stable/c/fcd9c923b58e86501450b9b442ccc7ce4a8d0fda - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-476 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Aug 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Aug 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-16 11:15
Updated : 2026-01-07 17:47
NVD link : CVE-2025-38513
Mitre link : CVE-2025-38513
CVE.ORG link : CVE-2025-38513
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
