In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fix queue selection for mesh/OCB interfaces
When using iTXQ, the code assumes that there is only one vif queue for
broadcast packets, using the BE queue. Allowing non-BE queue marking
violates that assumption and txq->ac == skb_queue_mapping is no longer
guaranteed. This can cause issues with queue handling in the driver and
also causes issues with the recent ATF change, resulting in an AQL
underflow warning.
References
Configurations
Configuration 1 (hide)
|
History
23 Oct 2025, 12:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/41ecab279a70dced9005f4d55fa0fcde8938603f - Patch | |
| References | () https://git.kernel.org/stable/c/444be5a02b77f3b7a8ac9c1a0b074fbb3bd89cd0 - Patch | |
| References | () https://git.kernel.org/stable/c/50e2ab39291947b6c6c7025cf01707c270fcde59 - Patch | |
| References | () https://git.kernel.org/stable/c/5a9df31017999197b6e60535940f2f2fe1bd3b0d - Patch | |
| References | () https://git.kernel.org/stable/c/e013ea2a51a94b903b396a8dff531a07d470335d - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
26 Feb 2025, 07:01
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-10-23 12:09
NVD link : CVE-2022-49646
Mitre link : CVE-2022-49646
CVE.ORG link : CVE-2022-49646
JSON object : View
Products Affected
linux
- linux_kernel
CWE
