CVE-2022-50665Improper Initialization in Linux

Severity
2.5LOW
No vector
EPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected It has a fail log which is ath11k_dbg in ath11k_dp_rx_process_mon_status(), as below, it will not print when debug_mask is not set ATH11K_DBG_DATA. ath11k_dbg(ab, ATH11K_DBG_DATA, "failed to find the peer with peer_id %d\n", ppdu_info.peer_id); When run scan with station disconnected, the peer_id is 0 for case HAL_RX_MPDU_START in ath11k_hal_rx_parse_m

Affected Packages4 packages

Linuxlinux/linux_kernel5.18.05.19.17+1
Debianlinux/linux_kernel< 6.0.3-1+2
CVEListV5linux/linux01d2f285e3e5b629df9c61514e7ee07a54d0eed9c0bb97a90b133416b50b3ffbdb7efca9253cc687+3
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50665: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected It has2025-12-09
OSV
wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected2025-12-09
GHSA
GHSA-ppjq-9892-q46w: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected It ha2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected2025-12-09
Debian
CVE-2022-50665: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11...2022