CVE-2025-38009

Source
https://cve.org/CVERecord?id=CVE-2025-38009
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38009.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38009
Downstream
Related
Published
2025-06-18T09:28:20.068Z
Modified
2026-03-20T12:42:38.054798Z
Summary
wifi: mt76: disable napi on driver removal
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: disable napi on driver removal

A warning on driver removal started occurring after commit 9dd05df8403b ("net: warn if NAPI instance wasn't shut down"). Disable tx napi before deleting it in mt76dmacleanup().

WARNING: CPU: 4 PID: 18828 at net/core/dev.c:7288 __netifnapidel_locked+0xf0/0x100 CPU: 4 UID: 0 PID: 18828 Comm: modprobe Not tainted 6.15.0-rc4 #4 PREEMPT(lazy) Hardware name: ASUS System Product Name/PRIME X670E-PRO WIFI, BIOS 3035 09/05/2024 RIP: 0010:__netifnapidel_locked+0xf0/0x100 Call Trace: <TASK> mt76dmacleanup+0x54/0x2f0 [mt76] mt7921pciremove+0xd5/0x190 [mt7921e] pcideviceremove+0x47/0xc0 devicereleasedriverinternal+0x19e/0x200 driverdetach+0x48/0x90 busremovedriver+0x6d/0xf0 pciunregisterdriver+0x2e/0xb0 _dosysdeletemodule.isra.0+0x197/0x2e0 dosyscall64+0x7b/0x160 entrySYSCALL64afterhwframe+0x76/0x7e

Tested with mt7921e but the same pattern can be actually applied to other mt76 drivers calling mt76dmacleanup() during removal. Tx napi is enabled in their *dmainit() functions and only toggled off and on again inside their suspend/resume/reset paths. So it should be okay to disable tx napi in such a generic way.

Found by Linux Verification Center (linuxtesting.org).

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38009.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2ac515a5d74f26963362d5da9589c67ca3663338
Fixed
ff0f820fa5b99035b3c654dd531226d8d83aec5f
Fixed
ca5b213bf4b4224335a8131a26805d16503fca5f
Fixed
b892e830d1ea8c5475254b98827771f7366f1039
Fixed
5e700b06b970fc19e3a1ecb244e14785f3fbb8e3
Fixed
2b81e76db3667d1f7f2ad44e9835cdaf8dea95a8
Fixed
e7bfbda5fddd27f3158e723d641c0fcdfb0552a7
Fixed
78ab4be549533432d97ea8989d2f00b508fa68d8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38009.json"