First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: avoid NULL pointer dereference iwl_mvm_tx_skb_sta() and iwl_mvm_tx_mpdu() verify that the mvmvsta pointer is not NULL. It retrieves this pointer using iwl_mvm_sta_from_mac80211, which is dereferencing the ieee80211_sta pointer. If sta is NULL, iwl_mvm_sta_from_mac80211 will dereference a NULL pointer. Fix this by checking the sta pointer before retrieving the mvmsta from it. If sta is not NULL, then mvmsta isn't either.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.6.55 | |
Linux Kernel | >=6.7<6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-49929 is considered to be of medium impact due to potential NULL pointer dereference in the Linux kernel.
To fix CVE-2024-49929, you should update your Linux kernel to version 6.6.55 or higher, or apply the relevant patches if applicable.
CVE-2024-49929 affects Linux kernel versions between 6.7 and 6.10.14, and also up to 6.11.3.
CVE-2024-49929 involves the wifi driver, specifically the iwlwifi module in the Linux kernel.
Yes, CVE-2024-49929 has been resolved in the latest Linux kernel versions and through specific package updates.