CVE-2025-21906

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/04/2025
Last modified:
31/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: iwlwifi: mvm: clean up ROC on failure<br /> <br /> If the firmware fails to start the session protection, then we<br /> do call iwl_mvm_roc_finished() here, but that won&amp;#39;t do anything<br /> at all because IWL_MVM_STATUS_ROC_P2P_RUNNING was never set.<br /> Set IWL_MVM_STATUS_ROC_P2P_RUNNING in the failure/stop path.<br /> If it started successfully before, it&amp;#39;s already set, so that<br /> doesn&amp;#39;t matter, and if it didn&amp;#39;t start it needs to be set to<br /> clean up.<br /> <br /> Not doing so will lead to a WARN_ON() later on a fresh remain-<br /> on-channel, since the link is already active when activated as<br /> it was never deactivated.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.12.19 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*