
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2022-49876) has been identified in the Linux kernel's wifi mac80211 subsystem, specifically affecting the ieee80211subifstart_xmit() function. The issue was disclosed on May 1, 2025, and affects Linux kernel versions from 5.19 up to (excluding) 6.0.9, as well as versions 6.1-rc1 through 6.1-rc4 (NVD).
The vulnerability occurs when a device is running and the interface status is changed, triggering a general-protection-fault. The issue manifests in a race condition between two threads: Thread A executing ieee80211runtimechangeiftype() and Thread B executing processone_work(). When the interface status changes, the sending queue continues to send packets after bss is set to NULL, leading to an invalid access. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability leads to a general protection fault in the kernel, which can cause system instability or crashes. The issue specifically affects the wireless networking stack's ability to handle interface status changes while processing network packets (Wiz).
The vulnerability has been resolved in the Linux kernel through patches that fix the general-protection-fault in ieee80211subifstart_xmit(). Users should update their Linux kernel to a version that includes these fixes. For Red Hat Enterprise Linux 9, the fix has been deferred (Red Hat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."