CVE-2025-22032: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix kernel panic due to null pointer dereference Address a kernel panic caused by a null pointer dereference in the `mt792x_rx_get_wcid` function. The issue arises because the `deflink` structure is not properly initialized with the `sta` context. This patch ensures that the `deflink` structure is correctly linked to the `sta` context, preventing the null pointer dereference. BUG: kernel NULL pointer dereference, address: 0000000000000400 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 UID: 0 PID: 470 Comm: mt76-usb-rx phy Not tainted 6.12.13-gentoo-dist #1 Hardware name: /AMD HUDSON-M1, BIOS 4.6.4 11/15/2011 RIP: 0010:mt792x_rx_get_wcid+0x48/0x140 [mt792x_lib] RSP: 0018:ffffa147c055fd98 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff8e9ecb652000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8e9ecb652000 RBP: 0000000000000685 R08: ffff8e9ec6570000 R09: 0000000000000000 R10: ffff8e9ecd2ca000 R11: ffff8e9f22a217c0 R12: 0000000038010119 R13: 0000000080843801 R14: ffff8e9ec6570000 R15: ffff8e9ecb652000 FS: 0000000000000000(0000) GS:ffff8e9f22a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000400 CR3: 000000000d2ea000 CR4: 00000000000006f0 Call Trace: <TASK> ? __die_body.cold+0x19/0x27 ? page_fault_oops+0x15a/0x2f0 ? search_module_extables+0x19/0x60 ? search_bpf_extables+0x5f/0x80 ? exc_page_fault+0x7e/0x180 ? asm_exc_page_fault+0x26/0x30 ? mt792x_rx_get_wcid+0x48/0x140 [mt792x_lib] mt7921_queue_rx_skb+0x1c6/0xaa0 [mt7921_common] mt76u_alloc_queues+0x784/0x810 [mt76_usb] ? __pfx___mt76_worker_fn+0x10/0x10 [mt76] __mt76_worker_fn+0x4f/0x80 [mt76] kthread+0xd2/0x100 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x34/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK> ---[ end trace 0000000000000000 ]---
AI Analysis
Technical Summary
CVE-2025-22032 is a vulnerability in the Linux kernel specifically affecting the mt76 wireless driver, which supports MediaTek Wi-Fi chipsets, notably the mt7921 device. The flaw arises from a null pointer dereference in the function mt792x_rx_get_wcid. This function is responsible for retrieving the wireless client identifier (WCID) associated with received packets. The root cause is improper initialization of the deflink structure, which is supposed to be linked to the station (sta) context. When this linkage is missing or incorrect, the kernel attempts to dereference a null pointer, leading to a kernel panic and system crash. The vulnerability manifests as a supervisor read access fault in kernel mode, causing a denial of service (DoS) condition due to the kernel panic. The issue affects Linux kernel versions prior to the patch that correctly initializes the deflink structure. The vulnerability does not require user interaction but does require the presence of the vulnerable wireless driver and likely some network activity triggering the affected code path. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability is technical in nature and relates to kernel stability and robustness in handling wireless packet processing for MediaTek mt7921 devices.
Potential Impact
For European organizations, this vulnerability poses a risk primarily of denial of service on Linux systems using affected MediaTek mt7921 wireless chipsets. Systems experiencing kernel panics can lead to unexpected reboots or crashes, disrupting critical services, especially in environments relying on Linux servers or embedded devices with these Wi-Fi modules. This can affect enterprise networks, industrial control systems, or IoT devices that use Linux with mt76 drivers. While the vulnerability does not directly lead to privilege escalation or data leakage, the resulting instability can cause operational downtime, impacting business continuity and service availability. Organizations with large Linux deployments or those using MediaTek Wi-Fi hardware in networking equipment should be particularly vigilant. The lack of known exploits reduces immediate risk, but the potential for crafted network traffic to trigger the panic means attackers could cause targeted DoS attacks. This is especially relevant for sectors with high availability requirements such as telecommunications, finance, and critical infrastructure in Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Apply the official Linux kernel patches that fix the deflink initialization in the mt792x_rx_get_wcid function as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updated kernel versions. 2) Identify and inventory all systems using MediaTek mt7921 wireless chipsets and the mt76 driver, including embedded devices and network appliances. 3) Where patching is not immediately feasible, consider disabling the affected wireless interfaces or replacing the hardware with non-affected chipsets to prevent exploitation. 4) Implement network segmentation and firewall rules to limit exposure of vulnerable devices to untrusted networks, reducing the likelihood of malicious packets triggering the vulnerability. 5) Monitor system logs for kernel panic events related to mt76 or mt7921 drivers to detect potential exploitation attempts. 6) Engage with hardware and Linux distribution vendors to ensure timely updates and support for affected devices. 7) For critical systems, consider deploying kernel live patching solutions that can apply fixes without requiring full system reboots, minimizing downtime.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2025-22032: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix kernel panic due to null pointer dereference Address a kernel panic caused by a null pointer dereference in the `mt792x_rx_get_wcid` function. The issue arises because the `deflink` structure is not properly initialized with the `sta` context. This patch ensures that the `deflink` structure is correctly linked to the `sta` context, preventing the null pointer dereference. BUG: kernel NULL pointer dereference, address: 0000000000000400 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 UID: 0 PID: 470 Comm: mt76-usb-rx phy Not tainted 6.12.13-gentoo-dist #1 Hardware name: /AMD HUDSON-M1, BIOS 4.6.4 11/15/2011 RIP: 0010:mt792x_rx_get_wcid+0x48/0x140 [mt792x_lib] RSP: 0018:ffffa147c055fd98 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff8e9ecb652000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8e9ecb652000 RBP: 0000000000000685 R08: ffff8e9ec6570000 R09: 0000000000000000 R10: ffff8e9ecd2ca000 R11: ffff8e9f22a217c0 R12: 0000000038010119 R13: 0000000080843801 R14: ffff8e9ec6570000 R15: ffff8e9ecb652000 FS: 0000000000000000(0000) GS:ffff8e9f22a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000400 CR3: 000000000d2ea000 CR4: 00000000000006f0 Call Trace: <TASK> ? __die_body.cold+0x19/0x27 ? page_fault_oops+0x15a/0x2f0 ? search_module_extables+0x19/0x60 ? search_bpf_extables+0x5f/0x80 ? exc_page_fault+0x7e/0x180 ? asm_exc_page_fault+0x26/0x30 ? mt792x_rx_get_wcid+0x48/0x140 [mt792x_lib] mt7921_queue_rx_skb+0x1c6/0xaa0 [mt7921_common] mt76u_alloc_queues+0x784/0x810 [mt76_usb] ? __pfx___mt76_worker_fn+0x10/0x10 [mt76] __mt76_worker_fn+0x4f/0x80 [mt76] kthread+0xd2/0x100 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x34/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK> ---[ end trace 0000000000000000 ]---
AI-Powered Analysis
Technical Analysis
CVE-2025-22032 is a vulnerability in the Linux kernel specifically affecting the mt76 wireless driver, which supports MediaTek Wi-Fi chipsets, notably the mt7921 device. The flaw arises from a null pointer dereference in the function mt792x_rx_get_wcid. This function is responsible for retrieving the wireless client identifier (WCID) associated with received packets. The root cause is improper initialization of the deflink structure, which is supposed to be linked to the station (sta) context. When this linkage is missing or incorrect, the kernel attempts to dereference a null pointer, leading to a kernel panic and system crash. The vulnerability manifests as a supervisor read access fault in kernel mode, causing a denial of service (DoS) condition due to the kernel panic. The issue affects Linux kernel versions prior to the patch that correctly initializes the deflink structure. The vulnerability does not require user interaction but does require the presence of the vulnerable wireless driver and likely some network activity triggering the affected code path. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability is technical in nature and relates to kernel stability and robustness in handling wireless packet processing for MediaTek mt7921 devices.
Potential Impact
For European organizations, this vulnerability poses a risk primarily of denial of service on Linux systems using affected MediaTek mt7921 wireless chipsets. Systems experiencing kernel panics can lead to unexpected reboots or crashes, disrupting critical services, especially in environments relying on Linux servers or embedded devices with these Wi-Fi modules. This can affect enterprise networks, industrial control systems, or IoT devices that use Linux with mt76 drivers. While the vulnerability does not directly lead to privilege escalation or data leakage, the resulting instability can cause operational downtime, impacting business continuity and service availability. Organizations with large Linux deployments or those using MediaTek Wi-Fi hardware in networking equipment should be particularly vigilant. The lack of known exploits reduces immediate risk, but the potential for crafted network traffic to trigger the panic means attackers could cause targeted DoS attacks. This is especially relevant for sectors with high availability requirements such as telecommunications, finance, and critical infrastructure in Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Apply the official Linux kernel patches that fix the deflink initialization in the mt792x_rx_get_wcid function as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updated kernel versions. 2) Identify and inventory all systems using MediaTek mt7921 wireless chipsets and the mt76 driver, including embedded devices and network appliances. 3) Where patching is not immediately feasible, consider disabling the affected wireless interfaces or replacing the hardware with non-affected chipsets to prevent exploitation. 4) Implement network segmentation and firewall rules to limit exposure of vulnerable devices to untrusted networks, reducing the likelihood of malicious packets triggering the vulnerability. 5) Monitor system logs for kernel panic events related to mt76 or mt7921 drivers to detect potential exploitation attempts. 6) Engage with hardware and Linux distribution vendors to ensure timely updates and support for affected devices. 7) For critical systems, consider deploying kernel live patching solutions that can apply fixes without requiring full system reboots, minimizing downtime.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.808Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9831c4522896dcbe7ec4
Added to database: 5/21/2025, 9:09:05 AM
Last enriched: 7/3/2025, 7:57:21 PM
Last updated: 8/11/2025, 11:28:46 AM
Views: 13
Related Threats
CVE-2025-8971: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8970: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50515: n/a
UnknownCVE-2025-50817: n/a
UnknownCVE-2025-55195: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in denoland std
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.