CVE-2022-49942

Source
https://cve.org/CVERecord?id=CVE-2022-49942
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49942.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49942
Downstream
Related
Published
2025-06-18T10:59:57.610Z
Modified
2026-03-20T12:24:47.662939Z
Summary
wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected

When we are not connected to a channel, sending channel "switch" announcement doesn't make any sense.

The BSS list is empty in that case. This causes the for loop in cfg80211getbss() to be bypassed, so the function returns NULL (check line 1424 of net/wireless/scan.c), causing the WARNON() in ieee80211ibsscsabeacon() to get triggered (check line 500 of net/mac80211/ibss.c), which was consequently reported on the syzkaller dashboard.

Thus, check if we have an existing connection before generating the CSA beacon in ieee80211ibssfinish_csa().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49942.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cd7760e62c2ac8581f050b2d36501d1a60beaf83
Fixed
cdb9a8da9b84800eb15506cd9363cf0cf059e677
Fixed
1691a48aef0a82d1754b9853dae7e3f5cacdf70b
Fixed
d9eb37db6a28b59a95a3461450ee209654c5f95b
Fixed
66689c5c02acd4d76c28498fe220998610aec61e
Fixed
dd649b49219a0388cc10fc40e4c2ea681566a780
Fixed
552ba102a6898630a7d16887f29e606d6fabe508
Fixed
864e280cb3a9a0f5212b16ef5057c4e692f7039d
Fixed
15bc8966b6d3a5b9bfe4c9facfa02f2b69b1e5f0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49942.json"