Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-21828— wifi: mac80211: don't flush non-uploaded STAs

EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-21828

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
wifi: mac80211: don't flush non-uploaded STAs
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't flush non-uploaded STAs If STA state is pre-moved to AUTHORIZED (such as in IBSS scenarios) and insertion fails, the station is freed. In this case, the driver never knew about the station, so trying to flush it is unexpected and may crash. Check if the sta was uploaded to the driver before and fix this.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于mac80211未上传的STA在刷新时可能导致崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux d00800a289c9349bb659a698cbd7bc04521dc927 ~ cf21ef3d430847ba864bbc9b2774fffcc03ce321 -
LinuxLinux 6.4 -

II. Public POCs for CVE-2025-21828

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-21828

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-03-06 · 46 CVEs total

CVE-2024-58063wifi: rtlwifi: fix memory leaks and invalid access at probe error path
CVE-2024-58060bpf: Reject struct_ops registration that uses module ptr and the module btf_id is missing
CVE-2024-58058ubifs: skip dumping tnc tree when zroot is null
CVE-2024-58055usb: gadget: f_tcm: Don't free command immediately
CVE-2024-58053rxrpc: Fix handling of received connection abort
CVE-2024-58054staging: media: max96712: fix kernel oops when removing module
CVE-2024-58052drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table
CVE-2024-58051ipmi: ipmb: Add check devm_kasprintf() returned value
CVE-2024-58056remoteproc: core: Fix ida_free call while not allocated
CVE-2024-58062wifi: iwlwifi: mvm: avoid NULL pointer dereference
CVE-2024-58061wifi: mac80211: prohibit deactivating all links
CVE-2024-58064wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap(
CVE-2024-58065clk: mmp: pxa1908-apbc: Fix NULL vs IS_ERR() check
CVE-2024-58066clk: mmp: pxa1908-apbcp: Fix a NULL vs IS_ERR() check
CVE-2024-58067clk: mmp: pxa1908-mpmu: Fix a NULL vs IS_ERR() check
CVE-2024-58069rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
CVE-2024-58068OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized
CVE-2024-58070bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT
CVE-2024-58071team: prevent adding a device which is already a team device lower
CVE-2024-58072wifi: rtlwifi: remove unused check_buddy_priv

Showing top 20 of 46 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-21828

No comments yet


Leave a comment