๐Ÿ” CVE Alert

CVE-2025-21744

UNKNOWN 0.0

wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() On removal of the device or unloading of the kernel module a potential NULL pointer dereference occurs. The following sequence deletes the interface: brcmf_detach() brcmf_remove_interface() brcmf_del_if() Inside the brcmf_del_if() function the drvr->if2bss[ifidx] is updated to BRCMF_BSSIDX_INVALID (-1) if the bsscfgidx matches. After brcmf_remove_interface() call the brcmf_proto_detach() function is called providing the following sequence: brcmf_detach() brcmf_proto_detach() brcmf_proto_msgbuf_detach() brcmf_flowring_detach() brcmf_msgbuf_delete_flowring() brcmf_msgbuf_remove_flowring() brcmf_flowring_delete() brcmf_get_ifp() brcmf_txfinalize() Since brcmf_get_ip() can and actually will return NULL in this case the call to brcmf_txfinalize() will result in a NULL pointer dereference inside brcmf_txfinalize() when trying to update ifp->ndev->stats.tx_errors. This will only happen if a flowring still has an skb. Although the NULL pointer dereference has only been seen when trying to update the tx statistic, all other uses of the ifp pointer have been guarded as well with an early return if ifp is NULL.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7f00ee2bbc630900ba16fc2690473f3e2db0e264 < 2326e19190e176fd72bb542b837a9d2b7fcb8693 7f00ee2bbc630900ba16fc2690473f3e2db0e264 < 59ff4fa653ff6db07c61152516ffba79c2a74bda 7f00ee2bbc630900ba16fc2690473f3e2db0e264 < 61541d9b5a23df33934fcc620a3a81f246b1b240 7f00ee2bbc630900ba16fc2690473f3e2db0e264 < 4e51d6d093e763348916e69d06d87e0a5593661b 7f00ee2bbc630900ba16fc2690473f3e2db0e264 < 3877fc67bd3d5566cc12763bce39710ceb74a97d 7f00ee2bbc630900ba16fc2690473f3e2db0e264 < fbbfef2a5b858eab55741a58b2ac9a0cc8d53c58 7f00ee2bbc630900ba16fc2690473f3e2db0e264 < a2beefc4fa49ebc22e664dc6b39dbd054f8488f9 7f00ee2bbc630900ba16fc2690473f3e2db0e264 < 68abd0c4ebf24cd499841a488b97a6873d5efabb 6faa698c35a43b9e74ea24e90fe37471d08d00d0 9119232cc92a269d7860b4aa51f07d3923a3cc10
Linux / Linux
4.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2326e19190e176fd72bb542b837a9d2b7fcb8693 git.kernel.org: https://git.kernel.org/stable/c/59ff4fa653ff6db07c61152516ffba79c2a74bda git.kernel.org: https://git.kernel.org/stable/c/61541d9b5a23df33934fcc620a3a81f246b1b240 git.kernel.org: https://git.kernel.org/stable/c/4e51d6d093e763348916e69d06d87e0a5593661b git.kernel.org: https://git.kernel.org/stable/c/3877fc67bd3d5566cc12763bce39710ceb74a97d git.kernel.org: https://git.kernel.org/stable/c/fbbfef2a5b858eab55741a58b2ac9a0cc8d53c58 git.kernel.org: https://git.kernel.org/stable/c/a2beefc4fa49ebc22e664dc6b39dbd054f8488f9 git.kernel.org: https://git.kernel.org/stable/c/68abd0c4ebf24cd499841a488b97a6873d5efabb lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html