CVE-2025-21979

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel wiphy_work before freeing wiphy A wiphy_work can be queued from the moment the wiphy is allocated and initialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the rdev::wiphy_work is getting queued. If wiphy_free is called before the rdev::wiphy_work had a chance to run, the wiphy memory will be freed, and then when it eventally gets to run it'll use invalid memory. Fix this by canceling the work before freeing the wiphy.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*

History

10 Apr 2025, 13:25

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0272d4af7f92997541d8bbf4c51918b93ded6ee2 - () https://git.kernel.org/stable/c/0272d4af7f92997541d8bbf4c51918b93ded6ee2 - Patch
References () https://git.kernel.org/stable/c/72d520476a2fab6f3489e8388ab524985d6c4b90 - () https://git.kernel.org/stable/c/72d520476a2fab6f3489e8388ab524985d6c4b90 - Patch
References () https://git.kernel.org/stable/c/75d262ad3c36d52852d764588fcd887f0fcd9138 - () https://git.kernel.org/stable/c/75d262ad3c36d52852d764588fcd887f0fcd9138 - Patch
References () https://git.kernel.org/stable/c/a5158d67bff06cb6fea31be39aeb319fd908ed8e - () https://git.kernel.org/stable/c/a5158d67bff06cb6fea31be39aeb319fd908ed8e - Patch
References () https://git.kernel.org/stable/c/dea22de162058216a90f2706f0d0b36f0ff309fd - () https://git.kernel.org/stable/c/dea22de162058216a90f2706f0d0b36f0ff309fd - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: cancelar wiphy_work antes de liberar wiphy. Un wiphy_work puede ponerse en cola desde el momento en que se asigna e inicializa el wiphy (es decir, wiphy_new_nm). Cuando se pone en cola un wiphy_work, también se pone en cola rdev::wiphy_work. Si se llama a wiphy_free antes de que rdev::wiphy_work se ejecute, se liberará la memoria del wiphy y, cuando finalmente se ejecute, usará memoria no válida. Para solucionar esto, cancele el trabajo antes de liberar el wiphy.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
First Time Linux linux Kernel
Linux

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-04-10 13:25


NVD link : CVE-2025-21979

Mitre link : CVE-2025-21979

CVE.ORG link : CVE-2025-21979


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free