cfg80211

  1. Linux Wireless Use After Free CVE-2025-21979 Patch Cancels Wiphy Work Before Free

    A subtle race in the Linux wireless stack — tracked as CVE-2025-21979 — can let a queued wiphy work item run after its owning wiphy object has already been freed, producing a classic use-after-free that reliably threatens system availability and, in worst cases, integrity; the Linux kernel...
  2. Kernel cfg80211 CVE-2025-37973 patch and Azure Linux attestation

    The Linux kernel patch for CVE-2025-37973 fixes a bounds-calculation error in the wifi subsystem’s cfg80211 code that could produce an out‑of‑bounds access during multi‑link element defragmentation — and Microsoft’s public advisory names Azure Linux as the Microsoft product the company has...
  3. CVE-2024-57898: Azure Linux Attestation and the Microsoft Ecosystem

    Microsoft’s brief advisory that “Azure Linux includes this open‑source library and is therefore potentially affected” is accurate as a product‑scoped attestation, but it is not a categorical proof that no other Microsoft product carries the same vulnerable Linux kernel component — any Microsoft...
  4. CVE-2025-38643: Linux Wireless Lock Bug Impacts Azure Linux and More

    CVE-2025-38643 is a recently disclosed Linux kernel vulnerability in the wireless subsystem — a missing lock in cfg80211_check_and_end_cac — and while Microsoft’s advisory names Azure Linux explicitly, that does not mean Azure Linux is the only Microsoft product that could include the affected...