๐Ÿ” CVE Alert

CVE-2025-21909

UNKNOWN 0.0

wifi: nl80211: reject cooked mode if it is set along with other flags

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: reject cooked mode if it is set along with other flags It is possible to set both MONITOR_FLAG_COOK_FRAMES and MONITOR_FLAG_ACTIVE flags simultaneously on the same monitor interface from the userspace. This causes a sub-interface to be created with no IEEE80211_SDATA_IN_DRIVER bit set because the monitor interface is in the cooked state and it takes precedence over all other states. When the interface is then being deleted the kernel calls WARN_ONCE() from check_sdata_in_driver() because of missing that bit. Fix this by rejecting MONITOR_FLAG_COOK_FRAMES if it is set along with other flags. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
66f7ac50ed7cc5c19a62bc97e8f6e7891004a03a < 5ea856d93794c4afa5542defd8c61f2708dc245a 66f7ac50ed7cc5c19a62bc97e8f6e7891004a03a < 351eb7ac53ff1cd94d893c0c4534ced2f36ae7d7 66f7ac50ed7cc5c19a62bc97e8f6e7891004a03a < cd1bdcb77fdc03c253137e55bae10551b3481461 66f7ac50ed7cc5c19a62bc97e8f6e7891004a03a < 236f41ca728f23210b31ed2d1d8a6df575a4b2d6 66f7ac50ed7cc5c19a62bc97e8f6e7891004a03a < ebebbb0eded2ed9a1abfa31962f6fb699e6abce7 66f7ac50ed7cc5c19a62bc97e8f6e7891004a03a < 521e55c2b0d6028861ac0a2d06aa57bb0e3ac486 66f7ac50ed7cc5c19a62bc97e8f6e7891004a03a < ac4860141300581d3e2f6c6dafa37220f7ea9f65 66f7ac50ed7cc5c19a62bc97e8f6e7891004a03a < 49f27f29446a5bfe633dd2cc0cfebd48a1a5e77f
Linux / Linux
2.6.26

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5ea856d93794c4afa5542defd8c61f2708dc245a git.kernel.org: https://git.kernel.org/stable/c/351eb7ac53ff1cd94d893c0c4534ced2f36ae7d7 git.kernel.org: https://git.kernel.org/stable/c/cd1bdcb77fdc03c253137e55bae10551b3481461 git.kernel.org: https://git.kernel.org/stable/c/236f41ca728f23210b31ed2d1d8a6df575a4b2d6 git.kernel.org: https://git.kernel.org/stable/c/ebebbb0eded2ed9a1abfa31962f6fb699e6abce7 git.kernel.org: https://git.kernel.org/stable/c/521e55c2b0d6028861ac0a2d06aa57bb0e3ac486 git.kernel.org: https://git.kernel.org/stable/c/ac4860141300581d3e2f6c6dafa37220f7ea9f65 git.kernel.org: https://git.kernel.org/stable/c/49f27f29446a5bfe633dd2cc0cfebd48a1a5e77f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html