CVE-2022-49942

Source
https://cve.org/CVERecord?id=CVE-2022-49942
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49942.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49942
Downstream
Related
Published
2025-06-18T10:59:57.610Z
Modified
2026-05-15T11:54:17.182279182Z
Summary
wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected

When we are not connected to a channel, sending channel "switch" announcement doesn't make any sense.

The BSS list is empty in that case. This causes the for loop in cfg80211getbss() to be bypassed, so the function returns NULL (check line 1424 of net/wireless/scan.c), causing the WARNON() in ieee80211ibsscsabeacon() to get triggered (check line 500 of net/mac80211/ibss.c), which was consequently reported on the syzkaller dashboard.

Thus, check if we have an existing connection before generating the CSA beacon in ieee80211ibssfinish_csa().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49942.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.13.0
Fixed
4.9.328
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.293
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.258
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.213
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.142
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.66
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49942.json"