๐Ÿ” CVE Alert

CVE-2025-38513

UNKNOWN 0.0

wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() There is a potential NULL pointer dereference in zd_mac_tx_to_dev(). For example, the following is possible: T0 T1 zd_mac_tx_to_dev() /* len == skb_queue_len(q) */ while (len > ZD_MAC_MAX_ACK_WAITERS) { filter_ack() spin_lock_irqsave(&q->lock, flags); /* position == skb_queue_len(q) */ for (i=1; i<position; i++) skb = __skb_dequeue(q) if (mac->type == NL80211_IFTYPE_AP) skb = __skb_dequeue(q); spin_unlock_irqrestore(&q->lock, flags); skb_dequeue() -> NULL Since there is a small gap between checking skb queue length and skb being unconditionally dequeued in zd_mac_tx_to_dev(), skb_dequeue() can return NULL. Then the pointer is passed to zd_mac_tx_status() where it is dereferenced. In order to avoid potential NULL pointer dereference due to situations like above, check if skb is not NULL before passing it to zd_mac_tx_status(). Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
459c51ad6e1fc19e91a53798358433d3c08cd09d < c1958270de947604cc6de05fc96dbba256b49cf0 459c51ad6e1fc19e91a53798358433d3c08cd09d < 014c34dc132015c4f918ada4982e952947ac1047 459c51ad6e1fc19e91a53798358433d3c08cd09d < b24f65c184540dfb967479320ecf7e8c2e9220dc 459c51ad6e1fc19e91a53798358433d3c08cd09d < adf08c96b963c7cd7ec1ee1c0c556228d9bedaae 459c51ad6e1fc19e91a53798358433d3c08cd09d < 5420de65efbeb6503bcf1d43451c9df67ad60298 459c51ad6e1fc19e91a53798358433d3c08cd09d < fcd9c923b58e86501450b9b442ccc7ce4a8d0fda 459c51ad6e1fc19e91a53798358433d3c08cd09d < 602b4eb2f25668de15de69860ec99caf65b3684d 459c51ad6e1fc19e91a53798358433d3c08cd09d < 74b1ec9f5d627d2bdd5e5b6f3f81c23317657023
Linux / Linux
2.6.25

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c1958270de947604cc6de05fc96dbba256b49cf0 git.kernel.org: https://git.kernel.org/stable/c/014c34dc132015c4f918ada4982e952947ac1047 git.kernel.org: https://git.kernel.org/stable/c/b24f65c184540dfb967479320ecf7e8c2e9220dc git.kernel.org: https://git.kernel.org/stable/c/adf08c96b963c7cd7ec1ee1c0c556228d9bedaae git.kernel.org: https://git.kernel.org/stable/c/5420de65efbeb6503bcf1d43451c9df67ad60298 git.kernel.org: https://git.kernel.org/stable/c/fcd9c923b58e86501450b9b442ccc7ce4a8d0fda git.kernel.org: https://git.kernel.org/stable/c/602b4eb2f25668de15de69860ec99caf65b3684d git.kernel.org: https://git.kernel.org/stable/c/74b1ec9f5d627d2bdd5e5b6f3f81c23317657023 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html