CVE-2022-50533NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7
Latest updateApr 19

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null-ptr deref on failed assoc If association to an AP without a link 0 fails, then we crash in tracing because it assumes that either ap_mld_addr or link 0 BSS is valid, since we clear sdata->vif.valid_links and then don't add the ap_mld_addr to the struct. Since we clear also sdata->vif.cfg.ap_addr, keep a local copy of it and assign it earlier, before clearing valid_links, to fix this.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.06.0.16+1
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linux81151ce462e533551f3284bfdb8e0f461c9220e6c695dfba8dfb82dc7ace4f22be088916cbf621ca+3
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

3
VulDB
Linux Kernel up to 6.0.15/6.1.1 wifi ap_mld_addr null pointer dereference (WID-SEC-2025-2229)2026-04-19
OSV
CVE-2022-50533: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null-ptr deref on failed assoc If association to an AP w2025-10-07
GHSA
GHSA-q5wr-hr4c-4mfv: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null-ptr deref on failed assoc If association to an AP2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: wifi: mac80211: mlme: fix null-ptr deref on failed assoc2025-10-07
Debian
CVE-2022-50533: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...2022