We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49937

wifi: cfg80211: Set correct chandef when starting CAC



Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Set correct chandef when starting CAC When starting CAC in a mode other than AP mode, it return a "WARNING: CPU: 0 PID: 63 at cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]" caused by the chandef.chan being null at the end of CAC. Solution: Ensure the channel definition is set for the different modes when starting CAC to avoid getting a NULL 'chan' at the end of CAC. Call Trace: ? show_regs.part.0+0x14/0x16 ? __warn+0x67/0xc0 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? report_bug+0xa7/0x130 ? exc_overflow+0x30/0x30 ? handle_bug+0x27/0x50 ? exc_invalid_op+0x18/0x60 ? handle_exception+0xf6/0xf6 ? exc_overflow+0x30/0x30 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? exc_overflow+0x30/0x30 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? regulatory_propagate_dfs_state.cold+0x1b/0x4c [cfg80211] ? cfg80211_propagate_cac_done_wk+0x1a/0x30 [cfg80211] ? process_one_work+0x165/0x280 ? worker_thread+0x120/0x3f0 ? kthread+0xc2/0xf0 ? process_one_work+0x280/0x280 ? kthread_complete_and_exit+0x20/0x20 ? ret_from_fork+0x19/0x24 [shorten subject, remove OCB, reorder cases to match previous list]

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 95f32191e50b75e0f75fae1bb925cdf51d8df0a3
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 04053e55dd50741cf6c59b9bbaa4238218c05c70
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f4dbfda159e43d49b43003cc3c2914751939035f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before c628026563f4ea9e0413dd4b69429e4a1db240b1
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 20361712880396e44ce80aaeec2d93d182035651
affected

Default status
affected

6.1.113
unaffected

6.6.55
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/95f32191e50b75e0f75fae1bb925cdf51d8df0a3

git.kernel.org/...c/04053e55dd50741cf6c59b9bbaa4238218c05c70

git.kernel.org/...c/f4dbfda159e43d49b43003cc3c2914751939035f

git.kernel.org/...c/c628026563f4ea9e0413dd4b69429e4a1db240b1

git.kernel.org/...c/20361712880396e44ce80aaeec2d93d182035651

cve.org (CVE-2024-49937)

nvd.nist.gov (CVE-2024-49937)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-49937

Support options

Helpdesk Chat, Email, Knowledgebase