APPLIED: [SRU Focal 0/3] CVE-2022-2022-42719

Stefan Bader stefan.bader at canonical.com
Wed Oct 19 09:52:20 UTC 2022


On 17.10.22 14:46, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A nearby attacker can spoof beacon frames that cause a UAF.
> 
> [Fix and backport]
> Johannes Berg came up with a different fix for 5.4.
> 
> [Potential regression]
> Users wifi stop working.
> 
> Johannes Berg (3):
>    mac80211: mlme: find auth challenge directly
>    wifi: mac80211: don't parse mbssid in assoc response
>    wifi: mac80211: fix MBSSID parsing use-after-free
> 
>   net/mac80211/ieee80211_i.h |  4 ++--
>   net/mac80211/mlme.c        | 21 +++++++++++++--------
>   net/mac80211/scan.c        |  2 ++
>   net/mac80211/util.c        | 11 ++++++-----
>   4 files changed, 23 insertions(+), 15 deletions(-)
> 

Applied to focal:linux/master-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221019/ecda9a7e/attachment.sig>


More information about the kernel-team mailing list