CVE-2022-49876
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
01/05/2025
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit()<br />
<br />
When device is running and the interface status is changed, the gpf issue<br />
is triggered. The problem triggering process is as follows:<br />
Thread A: Thread B<br />
ieee80211_runtime_change_iftype() process_one_work()<br />
... ...<br />
ieee80211_do_stop() ...<br />
... ...<br />
sdata->bss = NULL ...<br />
... ieee80211_subif_start_xmit()<br />
ieee80211_multicast_to_unicast<br />
//!sdata->bss->multicast_to_unicast<br />
cause gpf issue<br />
<br />
When the interface status is changed, the sending queue continues to send<br />
packets. After the bss is set to NULL, the bss is accessed. As a result,<br />
this causes a general-protection-fault issue.<br />
<br />
The following is the stack information:<br />
general protection fault, probably for non-canonical address<br />
0xdffffc000000002f: 0000 [#1] PREEMPT SMP KASAN<br />
KASAN: null-ptr-deref in range [0x0000000000000178-0x000000000000017f]<br />
Workqueue: mld mld_ifc_work<br />
RIP: 0010:ieee80211_subif_start_xmit+0x25b/0x1310<br />
Call Trace:<br />
<br />
dev_hard_start_xmit+0x1be/0x990<br />
__dev_queue_xmit+0x2c9a/0x3b60<br />
ip6_finish_output2+0xf92/0x1520<br />
ip6_finish_output+0x6af/0x11e0<br />
ip6_output+0x1ed/0x540<br />
mld_sendpack+0xa09/0xe70<br />
mld_ifc_work+0x71c/0xdb0<br />
process_one_work+0x9bf/0x1710<br />
worker_thread+0x665/0x1080<br />
kthread+0x2e4/0x3a0<br />
ret_from_fork+0x1f/0x30<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 6.0.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



