CVE-2025-40321
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| brcm | brcmfmac | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's brcmfmac driver when sending Action frames in standalone AP mode managed only by hostapd. The driver incorrectly uses a P2P vif pointer that is not initialized in this mode, leading to a NULL pointer dereference and a kernel crash. The issue arises because the P2P interfaces are only created when wpa_supplicant manages the wlan interface, not when hostapd does. The fix involves using the vif corresponding to the wireless device initiating the Action frame transmission, ensuring the driver does not crash even if the P2P vif is unavailable.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference in the brcmfmac driver when handling certain Action frames in standalone AP mode. This crash can lead to denial of service on affected devices, such as Raspberry Pi 4 Model B, disrupting network connectivity and device availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for crashes related to the brcmfmac driver, specifically NULL pointer dereferences when sending Action frames in standalone AP mode. You can check the kernel log for messages similar to: 'Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000' and call traces involving brcmf_p2p_send_action_frame and brcmfmac. Commands to check logs include: 'dmesg | grep brcmfmac' or 'journalctl -k | grep brcmfmac'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the brcmfmac driver has been fixed to handle Action frame transmissions correctly in standalone AP mode. This fix ensures the driver uses the correct vif pointer and prevents NULL pointer dereferences. Until an update is applied, avoid configurations where hostapd manages the wlan interface alone with brcmfmac, or monitor and restart the affected service if crashes occur.