CVE-2025-38450

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38450
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38450.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38450
Downstream
Published
2025-07-25T15:27:31Z
Modified
2025-10-18T04:39:42.193342Z
Summary
wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925stasetdecapoffload()

Add a NULL check for msta->vif before accessing its members to prevent a kernel panic in AP mode deployment. This also fix the issue reported in [1].

The crash occurs when this function is triggered before the station is fully initialized. The call trace shows a page fault at mt7925stasetdecapoffload() due to accessing resources when msta->vif is NULL.

Fix this by adding an early return if msta->vif is NULL and also check wcid.sta is ready. This ensures we only proceed with decap offload configuration when the station's state is properly initialized.

[14739.655703] Unable to handle kernel paging request at virtual address ffffffffffffffa0 [14739.811820] CPU: 0 UID: 0 PID: 895854 Comm: hostapd Tainted: G [14739.821394] Tainted: [C]=CRAP, [O]=OOTMODULE [14739.825746] Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) [14739.831577] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [14739.838538] pc : mt7925stasetdecapoffload+0xc0/0x1b8 [mt7925common] [14739.845271] lr : mt7925stasetdecapoffload+0x58/0x1b8 [mt7925common] [14739.851985] sp : ffffffc085efb500 [14739.855295] x29: ffffffc085efb500 x28: 0000000000000000 x27: ffffff807803a158 [14739.862436] x26: ffffff8041ececb8 x25: 0000000000000001 x24: 0000000000000001 [14739.869577] x23: 0000000000000001 x22: 0000000000000008 x21: ffffff8041ecea88 [14739.876715] x20: ffffff8041c19ca0 x19: ffffff8078031fe0 x18: 0000000000000000 [14739.883853] x17: 0000000000000000 x16: ffffffe2aeac1110 x15: 000000559da48080 [14739.890991] x14: 0000000000000001 x13: 0000000000000000 x12: 0000000000000000 [14739.898130] x11: 0a10020001008e88 x10: 0000000000001a50 x9 : ffffffe26457bfa0 [14739.905269] x8 : ffffff8042013bb0 x7 : ffffff807fb6cbf8 x6 : dead000000000100 [14739.912407] x5 : dead000000000122 x4 : ffffff80780326c8 x3 : 0000000000000000 [14739.919546] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff8041ececb8 [14739.926686] Call trace: [14739.929130] mt7925stasetdecapoffload+0xc0/0x1b8 [mt7925common] [14739.935505] ieee80211checkfastrx+0x19c/0x510 [mac80211] [14739.941344] _stainfomovestate+0xe4/0x510 [mac80211] [14739.946860] stainfomovestate+0x1c/0x30 [mac80211] [14739.952116] staapplyauthflags.constprop.0+0x90/0x1b0 [mac80211] [14739.958708] staapplyparameters+0x234/0x5e0 [mac80211] [14739.964332] ieee80211addstation+0xdc/0x190 [mac80211] [14739.969950] nl80211newstation+0x46c/0x670 [cfg80211] [14739.975516] genlfamilyrcvmsgdoit+0xdc/0x150 [14739.980158] genlrcvmsg+0x218/0x298 [14739.983830] netlinkrcvskb+0x64/0x138 [14739.987670] genlrcv+0x40/0x60 [14739.990816] netlinkunicast+0x314/0x380 [14739.994742] netlinksendmsg+0x198/0x3f0 [14739.998664] socksendmsg+0x64/0xc0 [14740.002324] syssendmsg+0x260/0x298 [14740.006242] _syssendmsg+0xb4/0x110

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b859ad65309a5f1654e8b284de582831fc88e2d8
Fixed
9b50874f297fcc62adc7396f35209878e51010b0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b859ad65309a5f1654e8b284de582831fc88e2d8
Fixed
91c3dec2453b3742e8f666957b99945edc30577f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b859ad65309a5f1654e8b284de582831fc88e2d8
Fixed
35ad47c0b3da04b00b19a8b9ed5632e2f2520472

Affected versions

v6.*

v6.10
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.23
v6.12.24
v6.12.25
v6.12.26
v6.12.27
v6.12.28
v6.12.29
v6.12.3
v6.12.30
v6.12.31
v6.12.32
v6.12.33
v6.12.34
v6.12.35
v6.12.36
v6.12.37
v6.12.38
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.15.1
v6.15.2
v6.15.3
v6.15.4
v6.15.5
v6.15.6
v6.16-rc1
v6.16-rc2
v6.16-rc3

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.12.39
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.7