CVE-2022-50533 — NULL Pointer Dereference in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 7
Latest updateApr 19
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: mlme: fix null-ptr deref on failed assoc
If association to an AP without a link 0 fails, then we crash in
tracing because it assumes that either ap_mld_addr or link 0 BSS
is valid, since we clear sdata->vif.valid_links and then don't
add the ap_mld_addr to the struct.
Since we clear also sdata->vif.cfg.ap_addr, keep a local copy of
it and assign it earlier, before clearing valid_links, to fix
this.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linux81151ce462e533551f3284bfdb8e0f461c9220e6 — c695dfba8dfb82dc7ace4f22be088916cbf621ca+3
Patches
🔴Vulnerability Details
3VulDB▶
Linux Kernel up to 6.0.15/6.1.1 wifi ap_mld_addr null pointer dereference (WID-SEC-2025-2229)↗2026-04-19
OSV▶
CVE-2022-50533: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null-ptr deref on failed assoc If association to an AP w↗2025-10-07
GHSA▶
GHSA-q5wr-hr4c-4mfv: In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: mlme: fix null-ptr deref on failed assoc
If association to an AP↗2025-10-07