In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: cancel wiphy_work before freeing wiphy
A wiphy_work can be queued from the moment the wiphy is allocated and
initialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the
rdev::wiphy_work is getting queued.
If wiphy_free is called before the rdev::wiphy_work had a chance to run,
the wiphy memory will be freed, and then when it eventally gets to run
it'll use invalid memory.
Fix this by canceling the work before freeing the wiphy.
References
Configurations
Configuration 1 (hide)
|
History
10 Apr 2025, 13:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0272d4af7f92997541d8bbf4c51918b93ded6ee2 - Patch | |
References | () https://git.kernel.org/stable/c/72d520476a2fab6f3489e8388ab524985d6c4b90 - Patch | |
References | () https://git.kernel.org/stable/c/75d262ad3c36d52852d764588fcd887f0fcd9138 - Patch | |
References | () https://git.kernel.org/stable/c/a5158d67bff06cb6fea31be39aeb319fd908ed8e - Patch | |
References | () https://git.kernel.org/stable/c/dea22de162058216a90f2706f0d0b36f0ff309fd - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* |
|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 | |
First Time |
Linux linux Kernel
Linux |
01 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-01 16:15
Updated : 2025-04-10 13:25
NVD link : CVE-2025-21979
Mitre link : CVE-2025-21979
CVE.ORG link : CVE-2025-21979
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free