cve-2025-22119
Vulnerability from cvelistv5
Published
2025-04-16 14:13
Modified
2025-06-27 10:21
Severity ?
Summary
wifi: cfg80211: init wiphy_work before allocating rfkill fails
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/wireless/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b679fe84cd5cc6f3481b7131fd28676191ad2615",
              "status": "affected",
              "version": "0272d4af7f92997541d8bbf4c51918b93ded6ee2",
              "versionType": "git"
            },
            {
              "lessThan": "eeacfbab984200dcdcd68fcf4c6e91e2c6b38792",
              "status": "affected",
              "version": "75d262ad3c36d52852d764588fcd887f0fcd9138",
              "versionType": "git"
            },
            {
              "lessThan": "60606efbf52582c0ab93e99789fddced6b47297a",
              "status": "affected",
              "version": "a5158d67bff06cb6fea31be39aeb319fd908ed8e",
              "versionType": "git"
            },
            {
              "lessThan": "2617f60c3613ef105b8db2d514d2cac2a1836f7d",
              "status": "affected",
              "version": "72d520476a2fab6f3489e8388ab524985d6c4b90",
              "versionType": "git"
            },
            {
              "lessThan": "fc88dee89d7b63eeb17699393eb659aadf9d9b7c",
              "status": "affected",
              "version": "72d520476a2fab6f3489e8388ab524985d6c4b90",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "dea22de162058216a90f2706f0d0b36f0ff309fd",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/wireless/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.14"
            },
            {
              "lessThan": "6.14",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.142",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.95",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.35",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.14.*",
              "status": "unaffected",
              "version": "6.14.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.142",
                  "versionStartIncluding": "6.1.132",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.95",
                  "versionStartIncluding": "6.6.84",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.35",
                  "versionStartIncluding": "6.12.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14.2",
                  "versionStartIncluding": "6.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15",
                  "versionStartIncluding": "6.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.13.8",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: init wiphy_work before allocating rfkill fails\n\nsyzbort reported a uninitialize wiphy_work_lock in cfg80211_dev_free. [1]\n\nAfter rfkill allocation fails, the wiphy release process will be performed,\nwhich will cause cfg80211_dev_free to access the uninitialized wiphy_work\nrelated data.\n\nMove the initialization of wiphy_work to before rfkill initialization to\navoid this issue.\n\n[1]\nINFO: trying to register non-static key.\nThe code is fine but needs lockdep annotation, or maybe\nyou didn\u0027t initialize this object before use?\nturning off the locking correctness validator.\nCPU: 0 UID: 0 PID: 5935 Comm: syz-executor550 Not tainted 6.14.0-rc6-syzkaller-00103-g4003c9e78778 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n assign_lock_key kernel/locking/lockdep.c:983 [inline]\n register_lock_class+0xc39/0x1240 kernel/locking/lockdep.c:1297\n __lock_acquire+0x135/0x3c40 kernel/locking/lockdep.c:5103\n lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5851\n __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]\n _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162\n cfg80211_dev_free+0x30/0x3d0 net/wireless/core.c:1196\n device_release+0xa1/0x240 drivers/base/core.c:2568\n kobject_cleanup lib/kobject.c:689 [inline]\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0x1e4/0x5a0 lib/kobject.c:737\n put_device+0x1f/0x30 drivers/base/core.c:3774\n wiphy_free net/wireless/core.c:1224 [inline]\n wiphy_new_nm+0x1c1f/0x2160 net/wireless/core.c:562\n ieee80211_alloc_hw_nm+0x1b7a/0x2260 net/mac80211/main.c:835\n mac80211_hwsim_new_radio+0x1d6/0x54e0 drivers/net/wireless/virtual/mac80211_hwsim.c:5185\n hwsim_new_radio_nl+0xb42/0x12b0 drivers/net/wireless/virtual/mac80211_hwsim.c:6242\n genl_family_rcv_msg_doit+0x202/0x2f0 net/netlink/genetlink.c:1115\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0x565/0x800 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2533\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]\n netlink_unicast+0x53c/0x7f0 net/netlink/af_netlink.c:1338\n netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1882\n sock_sendmsg_nosec net/socket.c:718 [inline]\n __sock_sendmsg net/socket.c:733 [inline]\n ____sys_sendmsg+0xaaf/0xc90 net/socket.c:2573\n ___sys_sendmsg+0x135/0x1e0 net/socket.c:2627\n __sys_sendmsg+0x16e/0x220 net/socket.c:2659\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n\nClose: https://syzkaller.appspot.com/bug?extid=aaf0488c83d1d5f4f029"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-27T10:21:15.571Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b679fe84cd5cc6f3481b7131fd28676191ad2615"
        },
        {
          "url": "https://git.kernel.org/stable/c/eeacfbab984200dcdcd68fcf4c6e91e2c6b38792"
        },
        {
          "url": "https://git.kernel.org/stable/c/60606efbf52582c0ab93e99789fddced6b47297a"
        },
        {
          "url": "https://git.kernel.org/stable/c/2617f60c3613ef105b8db2d514d2cac2a1836f7d"
        },
        {
          "url": "https://git.kernel.org/stable/c/fc88dee89d7b63eeb17699393eb659aadf9d9b7c"
        }
      ],
      "title": "wifi: cfg80211: init wiphy_work before allocating rfkill fails",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-22119",
    "datePublished": "2025-04-16T14:13:04.639Z",
    "dateReserved": "2024-12-29T08:45:45.823Z",
    "dateUpdated": "2025-06-27T10:21:15.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-22119\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-04-16T15:16:06.100\",\"lastModified\":\"2025-06-27T11:15:24.310\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nwifi: cfg80211: init wiphy_work before allocating rfkill fails\\n\\nsyzbort reported a uninitialize wiphy_work_lock in cfg80211_dev_free. [1]\\n\\nAfter rfkill allocation fails, the wiphy release process will be performed,\\nwhich will cause cfg80211_dev_free to access the uninitialized wiphy_work\\nrelated data.\\n\\nMove the initialization of wiphy_work to before rfkill initialization to\\navoid this issue.\\n\\n[1]\\nINFO: trying to register non-static key.\\nThe code is fine but needs lockdep annotation, or maybe\\nyou didn\u0027t initialize this object before use?\\nturning off the locking correctness validator.\\nCPU: 0 UID: 0 PID: 5935 Comm: syz-executor550 Not tainted 6.14.0-rc6-syzkaller-00103-g4003c9e78778 #0\\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\\nCall Trace:\\n \u003cTASK\u003e\\n __dump_stack lib/dump_stack.c:94 [inline]\\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\\n assign_lock_key kernel/locking/lockdep.c:983 [inline]\\n register_lock_class+0xc39/0x1240 kernel/locking/lockdep.c:1297\\n __lock_acquire+0x135/0x3c40 kernel/locking/lockdep.c:5103\\n lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5851\\n __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]\\n _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162\\n cfg80211_dev_free+0x30/0x3d0 net/wireless/core.c:1196\\n device_release+0xa1/0x240 drivers/base/core.c:2568\\n kobject_cleanup lib/kobject.c:689 [inline]\\n kobject_release lib/kobject.c:720 [inline]\\n kref_put include/linux/kref.h:65 [inline]\\n kobject_put+0x1e4/0x5a0 lib/kobject.c:737\\n put_device+0x1f/0x30 drivers/base/core.c:3774\\n wiphy_free net/wireless/core.c:1224 [inline]\\n wiphy_new_nm+0x1c1f/0x2160 net/wireless/core.c:562\\n ieee80211_alloc_hw_nm+0x1b7a/0x2260 net/mac80211/main.c:835\\n mac80211_hwsim_new_radio+0x1d6/0x54e0 drivers/net/wireless/virtual/mac80211_hwsim.c:5185\\n hwsim_new_radio_nl+0xb42/0x12b0 drivers/net/wireless/virtual/mac80211_hwsim.c:6242\\n genl_family_rcv_msg_doit+0x202/0x2f0 net/netlink/genetlink.c:1115\\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\\n genl_rcv_msg+0x565/0x800 net/netlink/genetlink.c:1210\\n netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2533\\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\\n netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]\\n netlink_unicast+0x53c/0x7f0 net/netlink/af_netlink.c:1338\\n netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1882\\n sock_sendmsg_nosec net/socket.c:718 [inline]\\n __sock_sendmsg net/socket.c:733 [inline]\\n ____sys_sendmsg+0xaaf/0xc90 net/socket.c:2573\\n ___sys_sendmsg+0x135/0x1e0 net/socket.c:2627\\n __sys_sendmsg+0x16e/0x220 net/socket.c:2659\\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\\n do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\\n\\nClose: https://syzkaller.appspot.com/bug?extid=aaf0488c83d1d5f4f029\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: falla la inicializaci\u00f3n de wiphy_work antes de asignar rfkill. syzbort report\u00f3 un bloqueo de wiphy_work sin inicializar en cfg80211_dev_free. [1] Tras el fallo de la asignaci\u00f3n de rfkill, se ejecutar\u00e1 el proceso de liberaci\u00f3n de wiphy, lo que provocar\u00e1 que cfg80211_dev_free acceda a los datos relacionados con wiphy_work sin inicializar. Para evitar este problema, cambie la inicializaci\u00f3n de wiphy_work a una anterior a la inicializaci\u00f3n de rfkill. [1] INFORMACI\u00d3N: Se intenta registrar una clave no est\u00e1tica. El c\u00f3digo funciona correctamente, pero necesita la anotaci\u00f3n lockdep. \u00bfO quiz\u00e1s no inicializ\u00f3 este objeto antes de usarlo? Desactivando el validador de correcci\u00f3n de bloqueo. CPU: 0 UID: 0 PID: 5935 Comm: syz-executor550 No contaminado 6.14.0-rc6-syzkaller-00103-g4003c9e78778 #0 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 01/04/2014 Seguimiento de llamadas:  __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 assign_lock_key kernel/locking/lockdep.c:983 [inline] register_lock_class+0xc39/0x1240 kernel/locking/lockdep.c:1297 __lock_acquire+0x135/0x3c40 kernel/locking/lockdep.c:5103 lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5851 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162 cfg80211_dev_free+0x30/0x3d0 net/wireless/core.c:1196 device_release+0xa1/0x240 drivers/base/core.c:2568 kobject_cleanup lib/kobject.c:689 [inline] kobject_release lib/kobject.c:720 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1e4/0x5a0 lib/kobject.c:737 put_device+0x1f/0x30 drivers/base/core.c:3774 wiphy_free net/wireless/core.c:1224 [inline] wiphy_new_nm+0x1c1f/0x2160 net/wireless/core.c:562 ieee80211_alloc_hw_nm+0x1b7a/0x2260 net/mac80211/main.c:835 mac80211_hwsim_new_radio+0x1d6/0x54e0 drivers/net/wireless/virtual/mac80211_hwsim.c:5185 hwsim_new_radio_nl+0xb42/0x12b0 drivers/net/wireless/virtual/mac80211_hwsim.c:6242 genl_family_rcv_msg_doit+0x202/0x2f0 net/netlink/genetlink.c:1115 genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline] genl_rcv_msg+0x565/0x800 net/netlink/genetlink.c:1210 netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2533 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219 netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline] netlink_unicast+0x53c/0x7f0 net/netlink/af_netlink.c:1338 netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1882 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg net/socket.c:733 [inline] ____sys_sendmsg+0xaaf/0xc90 net/socket.c:2573 ___sys_sendmsg+0x135/0x1e0 net/socket.c:2627 __sys_sendmsg+0x16e/0x220 net/socket.c:2659 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 Close: https://syzkaller.appspot.com/bug?extid=aaf0488c83d1d5f4f029 \"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2617f60c3613ef105b8db2d514d2cac2a1836f7d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/60606efbf52582c0ab93e99789fddced6b47297a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b679fe84cd5cc6f3481b7131fd28676191ad2615\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/eeacfbab984200dcdcd68fcf4c6e91e2c6b38792\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fc88dee89d7b63eeb17699393eb659aadf9d9b7c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.