First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel wiphy_work before freeing wiphy A wiphy_work can be queued from the moment the wiphy is allocated and initialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the rdev::wiphy_work is getting queued. If wiphy_free is called before the rdev::wiphy_work had a chance to run, the wiphy memory will be freed, and then when it eventally gets to run it'll use invalid memory. Fix this by canceling the work before freeing the wiphy.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=6.1.57<6.1.132 | |
Linux Kernel | >=6.5<6.6.84 | |
Linux Kernel | >=6.7<6.12.20 | |
Linux Kernel | >=6.13<6.13.8 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 | |
Linux Kernel | =6.14-rc3 | |
Linux Kernel | =6.14-rc4 | |
Linux Kernel | =6.14-rc5 | |
Linux Kernel | =6.14-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21979 is classified as a medium severity vulnerability impacting the Linux kernel.
To fix CVE-2025-21979, update to the latest version of the Linux kernel that includes the necessary patches.
CVE-2025-21979 affects various versions of the Linux kernel where the wifi cfg80211 subsystem is used.
If exploited, CVE-2025-21979 may lead to denial of service due to improper handling of wiphy_work structures.
Yes, CVE-2025-21979 has been publicly disclosed and documented for awareness and remediation.