CVE-2025-38606
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ath12k WiFi driver during beacon miss handling. The driver iterates over active virtual interfaces and tries to access a radio object (ar) through arvif->deflink->ar. However, for certain P2P interfaces, the radio object may not be initialized because the virtual device (vdev) is only linked to the radio after creation, which happens during channel assignment or scan requests. If a scan vdev is deleted, arvif->ar becomes uninitialized. When the driver tries to access this uninitialized pointer during beacon miss handling, it can cause a null pointer dereference, leading to potential kernel crashes or instability. The fix involves checking that the vdev is created before accessing the radio object.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or become unstable due to a null pointer dereference in the ath12k WiFi driver when handling beacon misses. This can lead to loss of network connectivity, system instability, or denial of service on affected devices using the ath12k driver with P2P capable WiFi interfaces.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for messages indicating beacon loss from access points and null pointer dereferences related to the ath12k driver, such as 'detected beacon loss from AP' and 'KASAN: null-ptr-deref' errors. Checking dmesg or journalctl logs for these signs can help identify the issue. Specific commands include: 'dmesg | grep ath12k' and 'journalctl -k | grep ath12k'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this vulnerability, which verifies that the virtual device (vdev) is created before accessing the radio object during beacon miss handling. Until the update is applied, monitoring for beacon loss and avoiding frequent scans on P2P interfaces may reduce the risk.