CVE-2025-38450
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
25/07/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload()<br />
<br />
Add a NULL check for msta->vif before accessing its members to prevent<br />
a kernel panic in AP mode deployment. This also fix the issue reported<br />
in [1].<br />
<br />
The crash occurs when this function is triggered before the station is<br />
fully initialized. The call trace shows a page fault at<br />
mt7925_sta_set_decap_offload() due to accessing resources when msta->vif<br />
is NULL.<br />
<br />
Fix this by adding an early return if msta->vif is NULL and also check<br />
wcid.sta is ready. This ensures we only proceed with decap offload<br />
configuration when the station&#39;s state is properly initialized.<br />
<br />
[14739.655703] Unable to handle kernel paging request at virtual address ffffffffffffffa0<br />
[14739.811820] CPU: 0 UID: 0 PID: 895854 Comm: hostapd Tainted: G<br />
[14739.821394] Tainted: [C]=CRAP, [O]=OOT_MODULE<br />
[14739.825746] Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)<br />
[14739.831577] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br />
[14739.838538] pc : mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common]<br />
[14739.845271] lr : mt7925_sta_set_decap_offload+0x58/0x1b8 [mt7925_common]<br />
[14739.851985] sp : ffffffc085efb500<br />
[14739.855295] x29: ffffffc085efb500 x28: 0000000000000000 x27: ffffff807803a158<br />
[14739.862436] x26: ffffff8041ececb8 x25: 0000000000000001 x24: 0000000000000001<br />
[14739.869577] x23: 0000000000000001 x22: 0000000000000008 x21: ffffff8041ecea88<br />
[14739.876715] x20: ffffff8041c19ca0 x19: ffffff8078031fe0 x18: 0000000000000000<br />
[14739.883853] x17: 0000000000000000 x16: ffffffe2aeac1110 x15: 000000559da48080<br />
[14739.890991] x14: 0000000000000001 x13: 0000000000000000 x12: 0000000000000000<br />
[14739.898130] x11: 0a10020001008e88 x10: 0000000000001a50 x9 : ffffffe26457bfa0<br />
[14739.905269] x8 : ffffff8042013bb0 x7 : ffffff807fb6cbf8 x6 : dead000000000100<br />
[14739.912407] x5 : dead000000000122 x4 : ffffff80780326c8 x3 : 0000000000000000<br />
[14739.919546] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff8041ececb8<br />
[14739.926686] Call trace:<br />
[14739.929130] mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common]<br />
[14739.935505] ieee80211_check_fast_rx+0x19c/0x510 [mac80211]<br />
[14739.941344] _sta_info_move_state+0xe4/0x510 [mac80211]<br />
[14739.946860] sta_info_move_state+0x1c/0x30 [mac80211]<br />
[14739.952116] sta_apply_auth_flags.constprop.0+0x90/0x1b0 [mac80211]<br />
[14739.958708] sta_apply_parameters+0x234/0x5e0 [mac80211]<br />
[14739.964332] ieee80211_add_station+0xdc/0x190 [mac80211]<br />
[14739.969950] nl80211_new_station+0x46c/0x670 [cfg80211]<br />
[14739.975516] genl_family_rcv_msg_doit+0xdc/0x150<br />
[14739.980158] genl_rcv_msg+0x218/0x298<br />
[14739.983830] netlink_rcv_skb+0x64/0x138<br />
[14739.987670] genl_rcv+0x40/0x60<br />
[14739.990816] netlink_unicast+0x314/0x380<br />
[14739.994742] netlink_sendmsg+0x198/0x3f0<br />
[14739.998664] __sock_sendmsg+0x64/0xc0<br />
[14740.002324] ____sys_sendmsg+0x260/0x298<br />
[14740.006242] ___sys_sendmsg+0xb4/0x110
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.12.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



