First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mt76: fix tx status related use-after-free race on station removal There is a small race window where ongoing tx activity can lead to a skb getting added to the status tracking idr after that idr has already been cleaned up, which will keep the wcid linked in the status poll list. Fix this by only adding status skbs if the wcid pointer is still assigned in dev->wcid, which gets cleared early by mt76_sta_pre_rcu_remove
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.16<5.17.14 | |
Linux Kernel | >=5.18<5.18.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49479 is classified with a medium severity due to its potential impact on system stability.
CVE-2022-49479 affects the Linux Kernel by introducing a use-after-free race condition related to ongoing transmission activities.
To fix CVE-2022-49479, update the Linux Kernel to version 5.17.14 or newer.
CVE-2022-49479 affects Linux Kernel versions from 5.16 to 5.18.3.
Systems running affected versions of the Linux Kernel are vulnerable to CVE-2022-49479.