List Corruption Vulnerability in Linux Kernel Affecting rtw89 Wireless Driver by Realtek
CVE-2025-21730
Summary
A vulnerability has been identified in the Linux kernel's rtw89 wireless driver, where an improper initialization of the mgnt_entry list can occur following a failed Wake on Wireless LAN (WoWLAN) resume operation. If the WoWLAN process fails, the 'rtw89_ops_add_interface()' function may trigger without removing the interface, causing the mgnt_entry list to be initialized again. This introduces the risk of list corruption, which can lead to undefined behavior in the kernel, exposing systems to potential instability or crashes. Mitigations have been implemented to prevent the double initialization of the list, thereby enhancing the reliability of the driver.
Affected Version(s)
Linux 0007546cb406be0dddf3d43f07683825affc6d4d < 7fc295fdd3992a9a07d12fd3f2e84dface23aedc
Linux 68ec751b288178de7d19b71ea61648269a35b8cd < 4ed5bf49819757303e657f3900725febf2f3926f
Linux 68ec751b288178de7d19b71ea61648269a35b8cd < 2f7667675df1b40b73ecc53b4b8c3189b1e5f2c1
References
Timeline
Vulnerability published
Vulnerability Reserved