{"vulnerability": "CVE-2025-21979", "sightings": [{"uuid": "057da391-2123-459b-91b6-714555a8c9d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21979", "type": "seen", "source": "https://t.me/cvedetector/21780", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21979 - \"Linux Kernel WiFi cfg80211 Use-After-Free Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-21979 \nPublished : April 1, 2025, 4:15 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: cfg80211: cancel wiphy_work before freeing wiphy  \n  \nA wiphy_work can be queued from the moment the wiphy is allocated and  \ninitialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the  \nrdev::wiphy_work is getting queued.  \n  \nIf wiphy_free is called before the rdev::wiphy_work had a chance to run,  \nthe wiphy memory will be freed, and then when it eventally gets to run  \nit'll use invalid memory.  \n  \nFix this by canceling the work before freeing the wiphy. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T19:44:23.000000Z"}]}