In the Linux kernel, the following vulnerability has been resolved:
wifi: rtl818x: Kill URBs before clearing tx status queue
In rtl8187_stop() move the call of usb_kill_anchored_urbs() before clearing
b_tx_status.queue. This change prevents callbacks from using already freed
skb due to anchor was not killed before freeing such skb.
BUG: kernel NULL pointer dereference, address: 0000000000000080
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Not tainted 6.15.0 #8 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
RIP: 0010:ieee80211_tx_status_irqsafe+0x21/0xc0 [mac80211]
Call Trace:
<IRQ>
rtl8187_tx_cb+0x116/0x150 [rtl8187]
__usb_hcd_giveback_urb+0x9d/0x120
usb_giveback_urb_bh+0xbb/0x140
process_one_work+0x19b/0x3c0
bh_worker+0x1a7/0x210
tasklet_action+0x10/0x30
handle_softirqs+0xf0/0x340
__irq_exit_rcu+0xcd/0xf0
common_interrupt+0x85/0xa0
</IRQ>
Tested on RTL8187BvE device.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2026, 18:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/14ca6952691fa8cc91e7644512e6ff24a595283f - Patch | |
| References | () https://git.kernel.org/stable/c/16d8fd74dbfca0ea58645cd2fca13be10cae3cdd - Patch | |
| References | () https://git.kernel.org/stable/c/7858a95566f4ebf59524666683d2dcdba3fca968 - Patch | |
| References | () https://git.kernel.org/stable/c/789415771422f4fb9f444044f86ecfaec55df1bd - Patch | |
| References | () https://git.kernel.org/stable/c/81cfe34d0630de4e23ae804dcc08fb6f861dc37d - Patch | |
| References | () https://git.kernel.org/stable/c/8c767727f331fb9455b0f81daad832b5925688cb - Patch | |
| References | () https://git.kernel.org/stable/c/c51a45ad9070a6d296174fcbe5c466352836c12b - Patch | |
| References | () https://git.kernel.org/stable/c/c73c773b09e313278f9b960303a2809b8440bac6 - Patch | |
| References | () https://git.kernel.org/stable/c/e64732ebff9e24258e7326f07adbe2f2b990daf8 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-476 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
20 Aug 2025, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
19 Aug 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-19 17:15
Updated : 2026-01-07 18:36
NVD link : CVE-2025-38604
Mitre link : CVE-2025-38604
CVE.ORG link : CVE-2025-38604
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
