In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: mlme: fix null-ptr deref on failed assoc
If association to an AP without a link 0 fails, then we crash in tracing because it assumes that either apmldaddr or link 0 BSS is valid, since we clear sdata->vif.validlinks and then don't add the apmld_addr to the struct.
Since we clear also sdata->vif.cfg.apaddr, keep a local copy of it and assign it earlier, before clearing validlinks, to fix this.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50533.json"
}[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-50533-1b7d7879",
"target": {
"file": "net/mac80211/mlme.c",
"function": "ieee80211_rx_mgmt_assoc_resp"
},
"digest": {
"length": 4739.0,
"function_hash": "57721638907546227878324672845829193125"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@78a6a43aaf87180ec7425a2a90468e1b4d09a1ec"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-50533-ae58f679",
"target": {
"file": "net/mac80211/mlme.c",
"function": "ieee80211_rx_mgmt_assoc_resp"
},
"digest": {
"length": 4678.0,
"function_hash": "94624186911997766253270925320815607648"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb7743955a929e44b308cc3f63f8cc03873c1bee"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-50533-b5f0b7f5",
"target": {
"file": "net/mac80211/mlme.c",
"function": "ieee80211_rx_mgmt_assoc_resp"
},
"digest": {
"length": 4591.0,
"function_hash": "22506351534999503642312697912176692467"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c695dfba8dfb82dc7ace4f22be088916cbf621ca"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-50533-cdcf3d34",
"target": {
"file": "net/mac80211/mlme.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"113017312792926177160223285612345025121",
"260668278028661794053018591474101302191",
"109092997621168231975282836360806182729",
"317606286203623442663007065531416284746",
"317085233719473032423186508615290978259",
"210813460278894681207421709316745712194",
"33137241497752680974560515223796338752",
"64599113873277783825041251929098382405",
"21988433052664153355816210055186676758",
"65934880726247774683907905551279572228",
"73000249017123545999882864376928926226",
"8276909440028568124360130338824109782"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@78a6a43aaf87180ec7425a2a90468e1b4d09a1ec"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-50533-fcbde3cf",
"target": {
"file": "net/mac80211/mlme.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"113017312792926177160223285612345025121",
"260668278028661794053018591474101302191",
"109092997621168231975282836360806182729",
"317606286203623442663007065531416284746",
"317085233719473032423186508615290978259",
"210813460278894681207421709316745712194",
"33137241497752680974560515223796338752",
"64599113873277783825041251929098382405",
"21988433052664153355816210055186676758",
"65934880726247774683907905551279572228",
"73000249017123545999882864376928926226",
"8276909440028568124360130338824109782"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c695dfba8dfb82dc7ace4f22be088916cbf621ca"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-50533-fd7207e6",
"target": {
"file": "net/mac80211/mlme.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"113017312792926177160223285612345025121",
"260668278028661794053018591474101302191",
"109092997621168231975282836360806182729",
"317606286203623442663007065531416284746",
"317085233719473032423186508615290978259",
"210813460278894681207421709316745712194",
"33137241497752680974560515223796338752",
"64599113873277783825041251929098382405",
"21988433052664153355816210055186676758",
"65934880726247774683907905551279572228",
"73000249017123545999882864376928926226",
"8276909440028568124360130338824109782"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb7743955a929e44b308cc3f63f8cc03873c1bee"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50533.json"