Skip to main content

CVE-2025-21979: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-21979cvecve-2025-21979
Published: Tue Apr 01 2025 (04/01/2025, 15:47:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel wiphy_work before freeing wiphy A wiphy_work can be queued from the moment the wiphy is allocated and initialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the rdev::wiphy_work is getting queued. If wiphy_free is called before the rdev::wiphy_work had a chance to run, the wiphy memory will be freed, and then when it eventally gets to run it'll use invalid memory. Fix this by canceling the work before freeing the wiphy.

AI-Powered Analysis

AILast updated: 06/30/2025, 11:27:23 UTC

Technical Analysis

CVE-2025-21979 is a use-after-free vulnerability in the Linux kernel's wireless configuration subsystem, specifically within the cfg80211 component that manages wireless device configuration. The vulnerability arises from improper handling of asynchronous work items (wiphy_work) associated with wireless physical devices (wiphy). When a wiphy device is allocated and initialized, a wiphy_work can be queued to run asynchronously. However, if the wiphy is freed (via wiphy_free) before the queued work executes, the work will eventually run referencing freed memory, leading to a use-after-free condition. This can cause undefined behavior such as kernel crashes, memory corruption, or potentially arbitrary code execution in kernel context. The root cause is the failure to cancel the pending wiphy_work before freeing the wiphy structure. The fix involves ensuring that any queued wiphy_work is canceled before the wiphy memory is released, preventing the work from running on invalid memory. This vulnerability affects multiple versions of the Linux kernel as indicated by the affected commit hashes, and it was publicly disclosed on April 1, 2025. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk to any systems running vulnerable Linux kernel versions with wireless networking enabled. Since cfg80211 is a core wireless configuration interface, many servers, desktops, and embedded devices using Linux with Wi-Fi capabilities could be affected. Exploitation could lead to kernel crashes causing denial of service, or in worst cases, privilege escalation or arbitrary code execution at the kernel level, compromising system integrity and confidentiality. This is particularly critical for infrastructure providers, telecommunications, and enterprises relying on Linux-based wireless networking. The vulnerability could disrupt business operations, lead to data breaches, or facilitate lateral movement within networks if exploited. Although no active exploits are known, the ease of triggering asynchronous work items and the kernel-level impact make this a high-risk issue that requires prompt attention.

Mitigation Recommendations

Organizations should promptly apply the official Linux kernel patches that cancel wiphy_work before freeing the wiphy structure. If immediate patching is not feasible, temporary mitigations include disabling wireless interfaces or removing wireless drivers to reduce attack surface. System administrators should audit their Linux kernel versions against the affected commits and upgrade to patched versions as soon as they become available. Additionally, monitoring kernel logs for unusual crashes or memory errors related to wireless components can help detect exploitation attempts. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enabling security modules like SELinux or AppArmor may also reduce exploitation risk. Finally, organizations should maintain robust incident response plans to quickly address any signs of compromise stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.798Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe8e0f

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 11:27:23 AM

Last updated: 8/17/2025, 7:00:57 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats