In the Linux kernel, the following vulnerability has been resolved:
mt76: fix tx status related use-after-free race on station removal
There is a small race window where ongoing tx activity can lead to a skb
getting added to the status tracking idr after that idr has already been
cleaned up, which will keep the wcid linked in the status poll list.
Fix this by only adding status skbs if the wcid pointer is still assigned
in dev->wcid, which gets cleared early by mt76_sta_pre_rcu_remove
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    24 Mar 2025, 19:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://git.kernel.org/stable/c/ddd426d72aca4054045a9bd3b80a4ce1d398f11f - Patch | |
| References | () https://git.kernel.org/stable/c/ef7f9f894cfd0b2e471206409a529af4a26ddd55 - Patch | |
| References | () https://git.kernel.org/stable/c/fcfe1b5e162bf473c1d47760962cec8523c00466 - Patch | |
| Summary | 
        
        
  | 
|
| First Time | 
        
        Linux linux Kernel
         Linux  | 
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 
27 Feb 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
| CWE | CWE-416 | 
26 Feb 2025, 07:01
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-26 07:01
Updated : 2025-03-24 19:59
NVD link : CVE-2022-49479
Mitre link : CVE-2022-49479
CVE.ORG link : CVE-2022-49479
JSON object : View
Products Affected
                linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
