CVE-2025-38294
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
10/07/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath12k: fix NULL access in assign channel context handler<br />
<br />
Currently, when ath12k_mac_assign_vif_to_vdev() fails, the radio handle<br />
(ar) gets accessed from the link VIF handle (arvif) for debug logging, This<br />
is incorrect. In the fail scenario, radio handle is NULL. Fix the NULL<br />
access, avoid radio handle access by moving to the hardware debug logging<br />
helper function (ath12k_hw_warn).<br />
<br />
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1<br />
Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.15.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



