CVE-2022-50627Improper Handling of Structural Elements in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix monitor mode bringup crash When the interface is brought up in monitor mode, it leads to NULL pointer dereference crash. This crash happens when the packet type is extracted for a SKB. This extraction which is present in the received msdu delivery path,is not needed for the monitor ring packets since they are all RAW packets. Hence appending the flags with "RX_FLAG_ONLY_MONITOR" to skip that extraction. Obse

Affected Packages4 packages

Linuxlinux/linux_kernel5.6.06.1.16+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linuxd5c65159f2895379e11ca13f62feabe93278985dd6ea1ca1d456bb661e5a9d104e69d2c261161115+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50627: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix monitor mode bringup crash When the interface is brought up in m2025-12-08
GHSA
GHSA-qr5m-r7jf-6jc5: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix monitor mode bringup crash When the interface is brought up in2025-12-08
OSV
wifi: ath11k: fix monitor mode bringup crash2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath11k: fix monitor mode bringup crash2025-12-08
Debian
CVE-2022-50627: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11...2022