CVE-2022-48875: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: sdata can be NULL during AMPDU start ieee80211_tx_ba_session_handle_start() may get NULL for sdata when a deauthentication is ongoing. Here a trace triggering the race with the hostapd test multi_ap_fronthaul_on_ap: (gdb) list *drv_ampdu_action+0x46 0x8b16 is in drv_ampdu_action (net/mac80211/driver-ops.c:396). 391 int ret = -EOPNOTSUPP; 392 393 might_sleep(); 394 395 sdata = get_bss_sdata(sdata); 396 if (!check_sdata_in_driver(sdata)) 397 return -EIO; 398 399 trace_drv_ampdu_action(local, sdata, params); 400 wlan0: moving STA 02:00:00:00:03:00 to state 3 wlan0: associated wlan0: deauthenticating from 02:00:00:00:03:00 by local choice (Reason: 3=DEAUTH_LEAVING) wlan3.sta1: Open BA session requested for 02:00:00:00:00:00 tid 0 wlan3.sta1: dropped frame to 02:00:00:00:00:00 (unauthorized port) wlan0: moving STA 02:00:00:00:03:00 to state 2 wlan0: moving STA 02:00:00:00:03:00 to state 1 wlan0: Removed STA 02:00:00:00:03:00 wlan0: Destroyed STA 02:00:00:00:03:00 BUG: unable to handle page fault for address: fffffffffffffb48 PGD 11814067 P4D 11814067 PUD 11816067 PMD 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 2 PID: 133397 Comm: kworker/u16:1 Tainted: G W 6.1.0-rc8-wt+ #59 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014 Workqueue: phy3 ieee80211_ba_session_work [mac80211] RIP: 0010:drv_ampdu_action+0x46/0x280 [mac80211] Code: 53 48 89 f3 be 89 01 00 00 e8 d6 43 bf ef e8 21 46 81 f0 83 bb a0 1b 00 00 04 75 0e 48 8b 9b 28 0d 00 00 48 81 eb 10 0e 00 00 <8b> 93 58 09 00 00 f6 c2 20 0f 84 3b 01 00 00 8b 05 dd 1c 0f 00 85 RSP: 0018:ffffc900025ebd20 EFLAGS: 00010287 RAX: 0000000000000000 RBX: fffffffffffff1f0 RCX: ffff888102228240 RDX: 0000000080000000 RSI: ffffffff918c5de0 RDI: ffff888102228b40 RBP: ffffc900025ebd40 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000000 R12: ffff888118c18ec0 R13: 0000000000000000 R14: ffffc900025ebd60 R15: ffff888018b7efb8 FS: 0000000000000000(0000) GS:ffff88817a600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffb48 CR3: 0000000105228006 CR4: 0000000000170ee0 Call Trace: <TASK> ieee80211_tx_ba_session_handle_start+0xd0/0x190 [mac80211] ieee80211_ba_session_work+0xff/0x2e0 [mac80211] process_one_work+0x29f/0x620 worker_thread+0x4d/0x3d0 ? process_one_work+0x620/0x620 kthread+0xfb/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 </TASK>
AI Analysis
Technical Summary
CVE-2022-48875 is a vulnerability identified in the Linux kernel's mac80211 wireless subsystem, specifically related to the handling of AMPDU (Aggregated MAC Protocol Data Unit) start operations. The vulnerability arises from a race condition where the sdata pointer, which represents the software data context for a Basic Service Set (BSS), can become NULL during the initiation of an AMPDU session. This situation occurs when a deauthentication process is concurrently ongoing, leading to a use-after-free or null pointer dereference scenario. The vulnerability is triggered in the function ieee80211_tx_ba_session_handle_start(), which manages Block Acknowledgement (BA) sessions for wireless transmissions. During the race, if a deauthentication event removes the station (STA) data structure, sdata becomes invalid, but the function continues to operate on it, causing a kernel crash (BUG) due to an unhandled page fault. The provided debug trace demonstrates the kernel oops and stack trace leading to the fault, indicating a critical flaw in concurrency control within the mac80211 driver operations. This flaw could be exploited to cause a denial of service (DoS) by crashing the kernel, potentially impacting wireless connectivity and system stability. The vulnerability affects Linux kernel versions prior to the patch and is particularly relevant for systems running wireless access points or clients using the mac80211 stack. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was reserved in mid-July 2024 and published in August 2024, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to any infrastructure relying on Linux-based wireless networking, including enterprise Wi-Fi access points, routers, and client devices using the mac80211 stack. The primary impact is a denial of service condition caused by kernel crashes, which can disrupt wireless connectivity and potentially lead to broader system instability or downtime. This is particularly critical for sectors that depend on continuous wireless availability, such as telecommunications, finance, healthcare, and critical infrastructure. The vulnerability could be triggered remotely if an attacker can induce deauthentication frames or manipulate wireless sessions, potentially causing widespread disruption in corporate or public Wi-Fi environments. Although no privilege escalation or data leakage is indicated, the loss of availability can have cascading effects on business operations and service delivery. Given the prevalence of Linux in networking equipment and servers across Europe, the impact could be substantial if unpatched systems are exploited, especially in environments with high wireless traffic and multiple connected clients.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the latest patched versions that address CVE-2022-48875. Since the issue stems from a race condition in the mac80211 driver, applying vendor-supplied kernel patches or upgrading to a kernel version released after the fix is essential. Network administrators should audit wireless infrastructure to identify devices running vulnerable kernel versions and schedule immediate patching. Additionally, organizations can implement network-level controls to monitor and restrict deauthentication frames or suspicious wireless management traffic that could trigger the race condition. Employing wireless intrusion detection/prevention systems (WIDS/WIPS) to detect anomalous deauthentication attempts can reduce exploitation risk. For critical systems where immediate patching is not feasible, temporarily disabling or limiting wireless functionality or isolating affected devices on separate network segments may reduce exposure. Finally, organizations should maintain robust incident response plans to quickly address potential DoS incidents affecting wireless connectivity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-48875: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: sdata can be NULL during AMPDU start ieee80211_tx_ba_session_handle_start() may get NULL for sdata when a deauthentication is ongoing. Here a trace triggering the race with the hostapd test multi_ap_fronthaul_on_ap: (gdb) list *drv_ampdu_action+0x46 0x8b16 is in drv_ampdu_action (net/mac80211/driver-ops.c:396). 391 int ret = -EOPNOTSUPP; 392 393 might_sleep(); 394 395 sdata = get_bss_sdata(sdata); 396 if (!check_sdata_in_driver(sdata)) 397 return -EIO; 398 399 trace_drv_ampdu_action(local, sdata, params); 400 wlan0: moving STA 02:00:00:00:03:00 to state 3 wlan0: associated wlan0: deauthenticating from 02:00:00:00:03:00 by local choice (Reason: 3=DEAUTH_LEAVING) wlan3.sta1: Open BA session requested for 02:00:00:00:00:00 tid 0 wlan3.sta1: dropped frame to 02:00:00:00:00:00 (unauthorized port) wlan0: moving STA 02:00:00:00:03:00 to state 2 wlan0: moving STA 02:00:00:00:03:00 to state 1 wlan0: Removed STA 02:00:00:00:03:00 wlan0: Destroyed STA 02:00:00:00:03:00 BUG: unable to handle page fault for address: fffffffffffffb48 PGD 11814067 P4D 11814067 PUD 11816067 PMD 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 2 PID: 133397 Comm: kworker/u16:1 Tainted: G W 6.1.0-rc8-wt+ #59 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014 Workqueue: phy3 ieee80211_ba_session_work [mac80211] RIP: 0010:drv_ampdu_action+0x46/0x280 [mac80211] Code: 53 48 89 f3 be 89 01 00 00 e8 d6 43 bf ef e8 21 46 81 f0 83 bb a0 1b 00 00 04 75 0e 48 8b 9b 28 0d 00 00 48 81 eb 10 0e 00 00 <8b> 93 58 09 00 00 f6 c2 20 0f 84 3b 01 00 00 8b 05 dd 1c 0f 00 85 RSP: 0018:ffffc900025ebd20 EFLAGS: 00010287 RAX: 0000000000000000 RBX: fffffffffffff1f0 RCX: ffff888102228240 RDX: 0000000080000000 RSI: ffffffff918c5de0 RDI: ffff888102228b40 RBP: ffffc900025ebd40 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000000 R12: ffff888118c18ec0 R13: 0000000000000000 R14: ffffc900025ebd60 R15: ffff888018b7efb8 FS: 0000000000000000(0000) GS:ffff88817a600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffb48 CR3: 0000000105228006 CR4: 0000000000170ee0 Call Trace: <TASK> ieee80211_tx_ba_session_handle_start+0xd0/0x190 [mac80211] ieee80211_ba_session_work+0xff/0x2e0 [mac80211] process_one_work+0x29f/0x620 worker_thread+0x4d/0x3d0 ? process_one_work+0x620/0x620 kthread+0xfb/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 </TASK>
AI-Powered Analysis
Technical Analysis
CVE-2022-48875 is a vulnerability identified in the Linux kernel's mac80211 wireless subsystem, specifically related to the handling of AMPDU (Aggregated MAC Protocol Data Unit) start operations. The vulnerability arises from a race condition where the sdata pointer, which represents the software data context for a Basic Service Set (BSS), can become NULL during the initiation of an AMPDU session. This situation occurs when a deauthentication process is concurrently ongoing, leading to a use-after-free or null pointer dereference scenario. The vulnerability is triggered in the function ieee80211_tx_ba_session_handle_start(), which manages Block Acknowledgement (BA) sessions for wireless transmissions. During the race, if a deauthentication event removes the station (STA) data structure, sdata becomes invalid, but the function continues to operate on it, causing a kernel crash (BUG) due to an unhandled page fault. The provided debug trace demonstrates the kernel oops and stack trace leading to the fault, indicating a critical flaw in concurrency control within the mac80211 driver operations. This flaw could be exploited to cause a denial of service (DoS) by crashing the kernel, potentially impacting wireless connectivity and system stability. The vulnerability affects Linux kernel versions prior to the patch and is particularly relevant for systems running wireless access points or clients using the mac80211 stack. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was reserved in mid-July 2024 and published in August 2024, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to any infrastructure relying on Linux-based wireless networking, including enterprise Wi-Fi access points, routers, and client devices using the mac80211 stack. The primary impact is a denial of service condition caused by kernel crashes, which can disrupt wireless connectivity and potentially lead to broader system instability or downtime. This is particularly critical for sectors that depend on continuous wireless availability, such as telecommunications, finance, healthcare, and critical infrastructure. The vulnerability could be triggered remotely if an attacker can induce deauthentication frames or manipulate wireless sessions, potentially causing widespread disruption in corporate or public Wi-Fi environments. Although no privilege escalation or data leakage is indicated, the loss of availability can have cascading effects on business operations and service delivery. Given the prevalence of Linux in networking equipment and servers across Europe, the impact could be substantial if unpatched systems are exploited, especially in environments with high wireless traffic and multiple connected clients.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the latest patched versions that address CVE-2022-48875. Since the issue stems from a race condition in the mac80211 driver, applying vendor-supplied kernel patches or upgrading to a kernel version released after the fix is essential. Network administrators should audit wireless infrastructure to identify devices running vulnerable kernel versions and schedule immediate patching. Additionally, organizations can implement network-level controls to monitor and restrict deauthentication frames or suspicious wireless management traffic that could trigger the race condition. Employing wireless intrusion detection/prevention systems (WIDS/WIPS) to detect anomalous deauthentication attempts can reduce exploitation risk. For critical systems where immediate patching is not feasible, temporarily disabling or limiting wireless functionality or isolating affected devices on separate network segments may reduce exposure. Finally, organizations should maintain robust incident response plans to quickly address potential DoS incidents affecting wireless connectivity.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-16T11:38:08.922Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6471
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 6/30/2025, 10:58:12 PM
Last updated: 8/12/2025, 10:04:01 AM
Views: 15
Related Threats
CVE-2025-52351: n/a
HighCVE-2025-52352: n/a
HighPre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
HighCVE-2025-7051: CWE-284 in N-able N-central
HighCVE-2025-57768: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Alanaktion phproject
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.