
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in the Linux kernel's rtw89 WiFi driver, specifically in the rtw89coretxkickoffandwait() function. The vulnerability was reported on October 15, 2025, and affects the wireless network functionality in the Linux kernel (Kernel NVD).
The vulnerability occurs when rtw89coretxkickoffandwait() attempts to access skbdata that has already been freed. The issue stems from a race condition between the waiting and signaling sides of the completion process. The bug manifests in the following sequence: the waiting thread executes rtw89coretxkickoffandwait() and assigns the wait pointer, while the completing thread handles rtw89pcitxstatus() and rtw89coretxwaitcomplete() (Kernel NVD).
When exploited, this vulnerability can lead to a kernel crash due to accessing freed memory, potentially causing system instability or denial of service conditions (Kernel NVD).
The vulnerability has been resolved through a patch that addresses the use-after-free condition in the rtw89coretxkickoffandwait() function. Users should update their Linux kernel to a version that includes this fix (Kernel NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."