Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-49937
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-21 Oct, 2024 | 18:01
Updated At-05 Jan, 2026 | 10:54
Rejected At-
▼CVE Numbering Authority (CNA)
wifi: cfg80211: Set correct chandef when starting CAC

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Set correct chandef when starting CAC When starting CAC in a mode other than AP mode, it return a "WARNING: CPU: 0 PID: 63 at cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]" caused by the chandef.chan being null at the end of CAC. Solution: Ensure the channel definition is set for the different modes when starting CAC to avoid getting a NULL 'chan' at the end of CAC. Call Trace: ? show_regs.part.0+0x14/0x16 ? __warn+0x67/0xc0 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? report_bug+0xa7/0x130 ? exc_overflow+0x30/0x30 ? handle_bug+0x27/0x50 ? exc_invalid_op+0x18/0x60 ? handle_exception+0xf6/0xf6 ? exc_overflow+0x30/0x30 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? exc_overflow+0x30/0x30 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? regulatory_propagate_dfs_state.cold+0x1b/0x4c [cfg80211] ? cfg80211_propagate_cac_done_wk+0x1a/0x30 [cfg80211] ? process_one_work+0x165/0x280 ? worker_thread+0x120/0x3f0 ? kthread+0xc2/0xf0 ? process_one_work+0x280/0x280 ? kthread_complete_and_exit+0x20/0x20 ? ret_from_fork+0x19/0x24 [shorten subject, remove OCB, reorder cases to match previous list]

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/wireless/nl80211.c
Default Status
unaffected
Versions
Affected
  • From 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 before 95f32191e50b75e0f75fae1bb925cdf51d8df0a3 (git)
  • From 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 before 04053e55dd50741cf6c59b9bbaa4238218c05c70 (git)
  • From 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 before f4dbfda159e43d49b43003cc3c2914751939035f (git)
  • From 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 before c628026563f4ea9e0413dd4b69429e4a1db240b1 (git)
  • From 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 before 20361712880396e44ce80aaeec2d93d182035651 (git)
  • 7a53ad13c09150076b7ddde96c2dfc5622c90b45 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/wireless/nl80211.c
Default Status
affected
Versions
Affected
  • 6.0
Unaffected
  • From 0 before 6.0 (semver)
  • From 6.1.113 through 6.1.* (semver)
  • From 6.6.55 through 6.6.* (semver)
  • From 6.10.14 through 6.10.* (semver)
  • From 6.11.3 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/95f32191e50b75e0f75fae1bb925cdf51d8df0a3
N/A
https://git.kernel.org/stable/c/04053e55dd50741cf6c59b9bbaa4238218c05c70
N/A
https://git.kernel.org/stable/c/f4dbfda159e43d49b43003cc3c2914751939035f
N/A
https://git.kernel.org/stable/c/c628026563f4ea9e0413dd4b69429e4a1db240b1
N/A
https://git.kernel.org/stable/c/20361712880396e44ce80aaeec2d93d182035651
N/A
Hyperlink: https://git.kernel.org/stable/c/95f32191e50b75e0f75fae1bb925cdf51d8df0a3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/04053e55dd50741cf6c59b9bbaa4238218c05c70
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f4dbfda159e43d49b43003cc3c2914751939035f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c628026563f4ea9e0413dd4b69429e4a1db240b1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/20361712880396e44ce80aaeec2d93d182035651
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
Details not found