๐Ÿ” CVE Alert

CVE-2024-49937

UNKNOWN 0.0

wifi: cfg80211: Set correct chandef when starting CAC

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Set correct chandef when starting CAC When starting CAC in a mode other than AP mode, it return a "WARNING: CPU: 0 PID: 63 at cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]" caused by the chandef.chan being null at the end of CAC. Solution: Ensure the channel definition is set for the different modes when starting CAC to avoid getting a NULL 'chan' at the end of CAC. Call Trace: ? show_regs.part.0+0x14/0x16 ? __warn+0x67/0xc0 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? report_bug+0xa7/0x130 ? exc_overflow+0x30/0x30 ? handle_bug+0x27/0x50 ? exc_invalid_op+0x18/0x60 ? handle_exception+0xf6/0xf6 ? exc_overflow+0x30/0x30 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? exc_overflow+0x30/0x30 ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211] ? regulatory_propagate_dfs_state.cold+0x1b/0x4c [cfg80211] ? cfg80211_propagate_cac_done_wk+0x1a/0x30 [cfg80211] ? process_one_work+0x165/0x280 ? worker_thread+0x120/0x3f0 ? kthread+0xc2/0xf0 ? process_one_work+0x280/0x280 ? kthread_complete_and_exit+0x20/0x20 ? ret_from_fork+0x19/0x24 [shorten subject, remove OCB, reorder cases to match previous list]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 < 95f32191e50b75e0f75fae1bb925cdf51d8df0a3 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 < 04053e55dd50741cf6c59b9bbaa4238218c05c70 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 < f4dbfda159e43d49b43003cc3c2914751939035f 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 < c628026563f4ea9e0413dd4b69429e4a1db240b1 7b0a0e3c3a88260b6fcb017e49f198463aa62ed1 < 20361712880396e44ce80aaeec2d93d182035651 7a53ad13c09150076b7ddde96c2dfc5622c90b45
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/95f32191e50b75e0f75fae1bb925cdf51d8df0a3 git.kernel.org: https://git.kernel.org/stable/c/04053e55dd50741cf6c59b9bbaa4238218c05c70 git.kernel.org: https://git.kernel.org/stable/c/f4dbfda159e43d49b43003cc3c2914751939035f git.kernel.org: https://git.kernel.org/stable/c/c628026563f4ea9e0413dd4b69429e4a1db240b1 git.kernel.org: https://git.kernel.org/stable/c/20361712880396e44ce80aaeec2d93d182035651 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html