CVE-2025-21906

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: clean up ROC on failure If the firmware fails to start the session protection, then we do call iwl_mvm_roc_finished() here, but that won't do anything at all because IWL_MVM_STATUS_ROC_P2P_RUNNING was never set. Set IWL_MVM_STATUS_ROC_P2P_RUNNING in the failure/stop path. If it started successfully before, it's already set, so that doesn't matter, and if it didn't start it needs to be set to clean up. Not doing so will lead to a WARN_ON() later on a fresh remain- on-channel, since the link is already active when activated as it was never deactivated.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*

History

31 Oct 2025, 17:57

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-665
References () https://git.kernel.org/stable/c/a88c18409b5d69f426d5acc583c053eac71756a3 - () https://git.kernel.org/stable/c/a88c18409b5d69f426d5acc583c053eac71756a3 - Patch
References () https://git.kernel.org/stable/c/d1a12fcb9051bbf38b2e5af310ffb102a0fab6f9 - () https://git.kernel.org/stable/c/d1a12fcb9051bbf38b2e5af310ffb102a0fab6f9 - Patch
References () https://git.kernel.org/stable/c/f9751163bffd3fe60794929829f810968c6de73d - () https://git.kernel.org/stable/c/f9751163bffd3fe60794929829f810968c6de73d - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: clean up ROC on fault () Si el firmware no inicia la protección de sesión, entonces llamamos a iwl_mvm_roc_finished() aquí, pero eso no hará nada en absoluto porque IWL_MVM_STATUS_ROC_P2P_RUNNING nunca se configuró. Establezca IWL_MVM_STATUS_ROC_P2P_RUNNING en la ruta de error/detención. Si se inició correctamente antes, ya está configurado, por lo que no importa, y si no se inició, debe configurarse para limpiar. No hacerlo conducirá a un WARN_ON() más tarde en un nuevo canal restante, ya que el enlace ya está activo cuando se activó, ya que nunca se desactivó.

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-10-31 17:57


NVD link : CVE-2025-21906

Mitre link : CVE-2025-21906

CVE.ORG link : CVE-2025-21906


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-665

Improper Initialization