Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38009
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-18 Jun, 2025 | 09:28
Updated At-03 Nov, 2025 | 19:58
Rejected At-
▼CVE Numbering Authority (CNA)
wifi: mt76: disable napi on driver removal

In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: disable napi on driver removal A warning on driver removal started occurring after commit 9dd05df8403b ("net: warn if NAPI instance wasn't shut down"). Disable tx napi before deleting it in mt76_dma_cleanup(). WARNING: CPU: 4 PID: 18828 at net/core/dev.c:7288 __netif_napi_del_locked+0xf0/0x100 CPU: 4 UID: 0 PID: 18828 Comm: modprobe Not tainted 6.15.0-rc4 #4 PREEMPT(lazy) Hardware name: ASUS System Product Name/PRIME X670E-PRO WIFI, BIOS 3035 09/05/2024 RIP: 0010:__netif_napi_del_locked+0xf0/0x100 Call Trace: <TASK> mt76_dma_cleanup+0x54/0x2f0 [mt76] mt7921_pci_remove+0xd5/0x190 [mt7921e] pci_device_remove+0x47/0xc0 device_release_driver_internal+0x19e/0x200 driver_detach+0x48/0x90 bus_remove_driver+0x6d/0xf0 pci_unregister_driver+0x2e/0xb0 __do_sys_delete_module.isra.0+0x197/0x2e0 do_syscall_64+0x7b/0x160 entry_SYSCALL_64_after_hwframe+0x76/0x7e Tested with mt7921e but the same pattern can be actually applied to other mt76 drivers calling mt76_dma_cleanup() during removal. Tx napi is enabled in their *_dma_init() functions and only toggled off and on again inside their suspend/resume/reset paths. So it should be okay to disable tx napi in such a generic way. Found by Linux Verification Center (linuxtesting.org).

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/mediatek/mt76/dma.c
Default Status
unaffected
Versions
Affected
  • From 2ac515a5d74f26963362d5da9589c67ca3663338 before ff0f820fa5b99035b3c654dd531226d8d83aec5f (git)
  • From 2ac515a5d74f26963362d5da9589c67ca3663338 before ca5b213bf4b4224335a8131a26805d16503fca5f (git)
  • From 2ac515a5d74f26963362d5da9589c67ca3663338 before b892e830d1ea8c5475254b98827771f7366f1039 (git)
  • From 2ac515a5d74f26963362d5da9589c67ca3663338 before 5e700b06b970fc19e3a1ecb244e14785f3fbb8e3 (git)
  • From 2ac515a5d74f26963362d5da9589c67ca3663338 before 2b81e76db3667d1f7f2ad44e9835cdaf8dea95a8 (git)
  • From 2ac515a5d74f26963362d5da9589c67ca3663338 before e7bfbda5fddd27f3158e723d641c0fcdfb0552a7 (git)
  • From 2ac515a5d74f26963362d5da9589c67ca3663338 before 78ab4be549533432d97ea8989d2f00b508fa68d8 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/mediatek/mt76/dma.c
Default Status
affected
Versions
Affected
  • 5.2
Unaffected
  • From 0 before 5.2 (semver)
  • From 5.10.238 through 5.10.* (semver)
  • From 5.15.184 through 5.15.* (semver)
  • From 6.1.140 through 6.1.* (semver)
  • From 6.6.92 through 6.6.* (semver)
  • From 6.12.30 through 6.12.* (semver)
  • From 6.14.8 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/ff0f820fa5b99035b3c654dd531226d8d83aec5f
N/A
https://git.kernel.org/stable/c/ca5b213bf4b4224335a8131a26805d16503fca5f
N/A
https://git.kernel.org/stable/c/b892e830d1ea8c5475254b98827771f7366f1039
N/A
https://git.kernel.org/stable/c/5e700b06b970fc19e3a1ecb244e14785f3fbb8e3
N/A
https://git.kernel.org/stable/c/2b81e76db3667d1f7f2ad44e9835cdaf8dea95a8
N/A
https://git.kernel.org/stable/c/e7bfbda5fddd27f3158e723d641c0fcdfb0552a7
N/A
https://git.kernel.org/stable/c/78ab4be549533432d97ea8989d2f00b508fa68d8
N/A
Hyperlink: https://git.kernel.org/stable/c/ff0f820fa5b99035b3c654dd531226d8d83aec5f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ca5b213bf4b4224335a8131a26805d16503fca5f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b892e830d1ea8c5475254b98827771f7366f1039
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5e700b06b970fc19e3a1ecb244e14785f3fbb8e3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2b81e76db3667d1f7f2ad44e9835cdaf8dea95a8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e7bfbda5fddd27f3158e723d641c0fcdfb0552a7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/78ab4be549533432d97ea8989d2f00b508fa68d8
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
N/A
https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html
Resource: N/A
Details not found