U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49934 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Fix UAF in ieee80211_scan_rx() ieee80211_scan_rx() tries to access scan_req->flags after a null check, but a UAF is observed when the scan is completed and __ieee80211_scan_completed() executes, which then calls cfg80211_scan_done() leading to the freeing of scan_req. Since scan_req is rcu_dereference()'d, prevent the racing in __ieee80211_scan_completed() by ensuring that from mac80211's POV it is no longer accessed from an RCU read critical section before we call cfg80211_scan_done().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/4abc8c07a065ecf771827bde3c63fbbe4aa0c08b kernel.org
https://git.kernel.org/stable/c/5d20c6f932f2758078d0454729129c894fe353e7 kernel.org
https://git.kernel.org/stable/c/60deb9f10eec5c6a20252ed36238b55d8b614a2c kernel.org
https://git.kernel.org/stable/c/6eb181a64fdabf10be9e54de728876667da20255 kernel.org
https://git.kernel.org/stable/c/78a07732fbb0934d14827d8f09b9aa6a49ee1aa9 kernel.org
https://git.kernel.org/stable/c/9ad48cbf8b07f10c1e4a7a262b32a9179ae9dd2d kernel.org
https://git.kernel.org/stable/c/c0445feb80a4d0854898118fa01073701f8d356b kernel.org
https://git.kernel.org/stable/c/e0ff39448cea654843744c72c6780293c5082cb1 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49934
NVD Published Date:
06/18/2025
NVD Last Modified:
06/18/2025
Source:
kernel.org