CVE-2025-21730Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.1%
top 78.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed If WoWLAN failed in resume flow, the rtw89_ops_add_interface() triggered without removing the interface first. Then the mgnt_entry list init again, causing the list_empty() check in rtw89_chanctx_ops_assign_vif() useless, and list_add_tail() again. Therefore, we have added a check to prevent double adding of the list. rtw89_8852ce 0000:01:00.0: failed to chec

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.136.13.2
Debianlinux/linux_kernel< 6.12.13-1+1
CVEListV5linux/linux0007546cb406be0dddf3d43f07683825affc6d4d7fc295fdd3992a9a07d12fd3f2e84dface23aedc+3
debiandebian/linux< linux 6.12.13-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-21730: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed If WoWLAN fail2025-02-27
GHSA
GHSA-cg84-5crp-xcxj: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed If WoWLAN fa2025-02-27

📋Vendor Advisories

2
Red Hat
kernel: wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed2025-02-27
Debian
CVE-2025-21730: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89...2025
CVE-2025-21730 — Linux vulnerability | cvebase