Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-21744
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Feb, 2025 | 02:12
Updated At-02 Jan, 2026 | 15:28
Rejected At-
▼CVE Numbering Authority (CNA)
wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() On removal of the device or unloading of the kernel module a potential NULL pointer dereference occurs. The following sequence deletes the interface: brcmf_detach() brcmf_remove_interface() brcmf_del_if() Inside the brcmf_del_if() function the drvr->if2bss[ifidx] is updated to BRCMF_BSSIDX_INVALID (-1) if the bsscfgidx matches. After brcmf_remove_interface() call the brcmf_proto_detach() function is called providing the following sequence: brcmf_detach() brcmf_proto_detach() brcmf_proto_msgbuf_detach() brcmf_flowring_detach() brcmf_msgbuf_delete_flowring() brcmf_msgbuf_remove_flowring() brcmf_flowring_delete() brcmf_get_ifp() brcmf_txfinalize() Since brcmf_get_ip() can and actually will return NULL in this case the call to brcmf_txfinalize() will result in a NULL pointer dereference inside brcmf_txfinalize() when trying to update ifp->ndev->stats.tx_errors. This will only happen if a flowring still has an skb. Although the NULL pointer dereference has only been seen when trying to update the tx statistic, all other uses of the ifp pointer have been guarded as well with an early return if ifp is NULL.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c
Default Status
unaffected
Versions
Affected
  • From 7f00ee2bbc630900ba16fc2690473f3e2db0e264 before 2326e19190e176fd72bb542b837a9d2b7fcb8693 (git)
  • From 7f00ee2bbc630900ba16fc2690473f3e2db0e264 before 59ff4fa653ff6db07c61152516ffba79c2a74bda (git)
  • From 7f00ee2bbc630900ba16fc2690473f3e2db0e264 before 61541d9b5a23df33934fcc620a3a81f246b1b240 (git)
  • From 7f00ee2bbc630900ba16fc2690473f3e2db0e264 before 4e51d6d093e763348916e69d06d87e0a5593661b (git)
  • From 7f00ee2bbc630900ba16fc2690473f3e2db0e264 before 3877fc67bd3d5566cc12763bce39710ceb74a97d (git)
  • From 7f00ee2bbc630900ba16fc2690473f3e2db0e264 before fbbfef2a5b858eab55741a58b2ac9a0cc8d53c58 (git)
  • From 7f00ee2bbc630900ba16fc2690473f3e2db0e264 before a2beefc4fa49ebc22e664dc6b39dbd054f8488f9 (git)
  • From 7f00ee2bbc630900ba16fc2690473f3e2db0e264 before 68abd0c4ebf24cd499841a488b97a6873d5efabb (git)
  • 6faa698c35a43b9e74ea24e90fe37471d08d00d0 (git)
  • 9119232cc92a269d7860b4aa51f07d3923a3cc10 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c
Default Status
affected
Versions
Affected
  • 4.9
Unaffected
  • From 0 before 4.9 (semver)
  • From 5.4.291 through 5.4.* (semver)
  • From 5.10.235 through 5.10.* (semver)
  • From 5.15.179 through 5.15.* (semver)
  • From 6.1.129 through 6.1.* (semver)
  • From 6.6.78 through 6.6.* (semver)
  • From 6.12.14 through 6.12.* (semver)
  • From 6.13.3 through 6.13.* (semver)
  • From 6.14 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2326e19190e176fd72bb542b837a9d2b7fcb8693
N/A
https://git.kernel.org/stable/c/59ff4fa653ff6db07c61152516ffba79c2a74bda
N/A
https://git.kernel.org/stable/c/61541d9b5a23df33934fcc620a3a81f246b1b240
N/A
https://git.kernel.org/stable/c/4e51d6d093e763348916e69d06d87e0a5593661b
N/A
https://git.kernel.org/stable/c/3877fc67bd3d5566cc12763bce39710ceb74a97d
N/A
https://git.kernel.org/stable/c/fbbfef2a5b858eab55741a58b2ac9a0cc8d53c58
N/A
https://git.kernel.org/stable/c/a2beefc4fa49ebc22e664dc6b39dbd054f8488f9
N/A
https://git.kernel.org/stable/c/68abd0c4ebf24cd499841a488b97a6873d5efabb
N/A
Hyperlink: https://git.kernel.org/stable/c/2326e19190e176fd72bb542b837a9d2b7fcb8693
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/59ff4fa653ff6db07c61152516ffba79c2a74bda
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/61541d9b5a23df33934fcc620a3a81f246b1b240
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4e51d6d093e763348916e69d06d87e0a5593661b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3877fc67bd3d5566cc12763bce39710ceb74a97d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fbbfef2a5b858eab55741a58b2ac9a0cc8d53c58
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a2beefc4fa49ebc22e664dc6b39dbd054f8488f9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/68abd0c4ebf24cd499841a488b97a6873d5efabb
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
Resource: N/A
Details not found