CVE-2022-49416
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix use-after-free in chanctx code In ieee80211_vif_use_reserved_context(), when we have an old context and the new context's replace_state is set to IEEE80211_CHANCTX_REPLACE_NONE, we free the old context in ieee80211_vif_use_reserved_reassign(). Therefore, we cannot check the old_ctx anymore, so we should set it to NULL after this point. However, since the new_ctx replace state is clearly not IEEE80211_CHANCTX_REPLACES_OTHER, we're not going to do anything else in this function and can just return to avoid accessing the freed old_ctx.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 3.17 ≤ 𝑥 < 4.9.318 |
linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.283 |
linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.247 |
linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.198 |
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.121 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.46 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.17.14 |
linux | linux_kernel | 5.18 ≤ 𝑥 < 5.18.3 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
References