CVE-2024-49937
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: cfg80211: Set correct chandef when starting CAC<br />
<br />
When starting CAC in a mode other than AP mode, it return a<br />
"WARNING: CPU: 0 PID: 63 at cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]"<br />
caused by the chandef.chan being null at the end of CAC.<br />
<br />
Solution: Ensure the channel definition is set for the different modes<br />
when starting CAC to avoid getting a NULL &#39;chan&#39; at the end of CAC.<br />
<br />
Call Trace:<br />
? show_regs.part.0+0x14/0x16<br />
? __warn+0x67/0xc0<br />
? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]<br />
? report_bug+0xa7/0x130<br />
? exc_overflow+0x30/0x30<br />
? handle_bug+0x27/0x50<br />
? exc_invalid_op+0x18/0x60<br />
? handle_exception+0xf6/0xf6<br />
? exc_overflow+0x30/0x30<br />
? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]<br />
? exc_overflow+0x30/0x30<br />
? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]<br />
? regulatory_propagate_dfs_state.cold+0x1b/0x4c [cfg80211]<br />
? cfg80211_propagate_cac_done_wk+0x1a/0x30 [cfg80211]<br />
? process_one_work+0x165/0x280<br />
? worker_thread+0x120/0x3f0<br />
? kthread+0xc2/0xf0<br />
? process_one_work+0x280/0x280<br />
? kthread_complete_and_exit+0x20/0x20<br />
? ret_from_fork+0x19/0x24<br />
<br />
[shorten subject, remove OCB, reorder cases to match previous list]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.113 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.55 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/04053e55dd50741cf6c59b9bbaa4238218c05c70
- https://git.kernel.org/stable/c/20361712880396e44ce80aaeec2d93d182035651
- https://git.kernel.org/stable/c/95f32191e50b75e0f75fae1bb925cdf51d8df0a3
- https://git.kernel.org/stable/c/c628026563f4ea9e0413dd4b69429e4a1db240b1
- https://git.kernel.org/stable/c/f4dbfda159e43d49b43003cc3c2914751939035f
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



