CVE-2025-68360
Use-After-Free in Linux mt76 WED Driver Causing Kernel Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mt76 | mt76 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's mt76 wireless driver, specifically in the MT7996 driver that uses wed and wed_hif2 devices to offload traffic. The issue arises because the code incorrectly assumes that the primary wed device is always used in wed callbacks. When the hardware runs wed_hif2 (such as a 6GHz link), this assumption causes a crash due to an invalid memory read, leading to a kernel panic (Oops). The fix involves properly detecting and using the correct wed reference in the callbacks to prevent this crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when using the affected wireless driver on hardware that runs wed_hif2 devices. This crash can lead to system instability, downtime, and potential loss of network connectivity, impacting the availability and reliability of systems using this driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by monitoring your system logs for kernel crash messages related to the mt76 driver, specifically messages indicating a kernel read from unreadable memory at virtual address 000000000000080a and internal errors or Oops traces involving mt76_wed_offload_disable and mtk_wed_flow_remove functions. Checking dmesg or journalctl logs for such errors can help identify the issue. For example, use commands like 'dmesg | grep mt76' or 'journalctl -k | grep mt76' to look for relevant crash traces.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the mt76 driver properly detects and uses the correct wed reference in callbacks, as the vulnerability is fixed by correcting the wed reference usage in the driver. Until an update is applied, consider disabling the mt76 wed offload feature if possible to prevent triggering the crash.