U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49942 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected When we are not connected to a channel, sending channel "switch" announcement doesn't make any sense. The BSS list is empty in that case. This causes the for loop in cfg80211_get_bss() to be bypassed, so the function returns NULL (check line 1424 of net/wireless/scan.c), causing the WARN_ON() in ieee80211_ibss_csa_beacon() to get triggered (check line 500 of net/mac80211/ibss.c), which was consequently reported on the syzkaller dashboard. Thus, check if we have an existing connection before generating the CSA beacon in ieee80211_ibss_finish_csa().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/15bc8966b6d3a5b9bfe4c9facfa02f2b69b1e5f0 kernel.org
https://git.kernel.org/stable/c/1691a48aef0a82d1754b9853dae7e3f5cacdf70b kernel.org
https://git.kernel.org/stable/c/552ba102a6898630a7d16887f29e606d6fabe508 kernel.org
https://git.kernel.org/stable/c/66689c5c02acd4d76c28498fe220998610aec61e kernel.org
https://git.kernel.org/stable/c/864e280cb3a9a0f5212b16ef5057c4e692f7039d kernel.org
https://git.kernel.org/stable/c/cdb9a8da9b84800eb15506cd9363cf0cf059e677 kernel.org
https://git.kernel.org/stable/c/d9eb37db6a28b59a95a3461450ee209654c5f95b kernel.org
https://git.kernel.org/stable/c/dd649b49219a0388cc10fc40e4c2ea681566a780 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49942
NVD Published Date:
06/18/2025
NVD Last Modified:
06/18/2025
Source:
kernel.org