First published: Wed Apr 10 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type If the userspace tools switch from NL80211_IFTYPE_P2P_GO to NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it does not call the cleanup cfg80211_stop_ap(), this leads to the initialization of in-use data. For example, this path re-init the sdata->assigned_chanctx_list while it is still an element of assigned_vifs list, and makes that linked list corrupt.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.6.0<4.4.293 | |
Linux Linux kernel | >=4.5.0<4.9.291 | |
Linux Linux kernel | >=4.10.0<4.14.256 | |
Linux Linux kernel | >=4.15.0<4.19.218 | |
Linux Linux kernel | >=4.20.0<5.4.162 | |
Linux Linux kernel | >=5.5.0<5.10.82 | |
Linux Linux kernel | >=5.11.0<5.15.5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.