We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49942

wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected



Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected When we are not connected to a channel, sending channel "switch" announcement doesn't make any sense. The BSS list is empty in that case. This causes the for loop in cfg80211_get_bss() to be bypassed, so the function returns NULL (check line 1424 of net/wireless/scan.c), causing the WARN_ON() in ieee80211_ibss_csa_beacon() to get triggered (check line 500 of net/mac80211/ibss.c), which was consequently reported on the syzkaller dashboard. Thus, check if we have an existing connection before generating the CSA beacon in ieee80211_ibss_finish_csa().

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

cd7760e62c2ac8581f050b2d36501d1a60beaf83 before cdb9a8da9b84800eb15506cd9363cf0cf059e677
affected

cd7760e62c2ac8581f050b2d36501d1a60beaf83 before 1691a48aef0a82d1754b9853dae7e3f5cacdf70b
affected

cd7760e62c2ac8581f050b2d36501d1a60beaf83 before d9eb37db6a28b59a95a3461450ee209654c5f95b
affected

cd7760e62c2ac8581f050b2d36501d1a60beaf83 before 66689c5c02acd4d76c28498fe220998610aec61e
affected

cd7760e62c2ac8581f050b2d36501d1a60beaf83 before dd649b49219a0388cc10fc40e4c2ea681566a780
affected

cd7760e62c2ac8581f050b2d36501d1a60beaf83 before 552ba102a6898630a7d16887f29e606d6fabe508
affected

cd7760e62c2ac8581f050b2d36501d1a60beaf83 before 864e280cb3a9a0f5212b16ef5057c4e692f7039d
affected

cd7760e62c2ac8581f050b2d36501d1a60beaf83 before 15bc8966b6d3a5b9bfe4c9facfa02f2b69b1e5f0
affected

Default status
affected

3.13
affected

Any version before 3.13
unaffected

4.9.328
unaffected

4.14.293
unaffected

4.19.258
unaffected

5.4.213
unaffected

5.10.142
unaffected

5.15.66
unaffected

5.19.8
unaffected

6.0
unaffected

References

git.kernel.org/...c/cdb9a8da9b84800eb15506cd9363cf0cf059e677

git.kernel.org/...c/1691a48aef0a82d1754b9853dae7e3f5cacdf70b

git.kernel.org/...c/d9eb37db6a28b59a95a3461450ee209654c5f95b

git.kernel.org/...c/66689c5c02acd4d76c28498fe220998610aec61e

git.kernel.org/...c/dd649b49219a0388cc10fc40e4c2ea681566a780

git.kernel.org/...c/552ba102a6898630a7d16887f29e606d6fabe508

git.kernel.org/...c/864e280cb3a9a0f5212b16ef5057c4e692f7039d

git.kernel.org/...c/15bc8966b6d3a5b9bfe4c9facfa02f2b69b1e5f0

cve.org (CVE-2022-49942)

nvd.nist.gov (CVE-2022-49942)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49942

Support options

Helpdesk Chat, Email, Knowledgebase