CVE-2022-50678Linux vulnerability

6 documents5 sources
Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix invalid address access when enabling SCAN log level The variable i is changed when setting random MAC address and causes invalid address access when printing the value of pi->reqs[i]->reqid. We replace reqs index with ri to fix the issue. [ 136.726473] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000 [ 136.737365] Mem abort info: [ 136.740172] ESR

Affected Packages4 packages

Linuxlinux/linux_kernel4.13.04.14.296+6
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxefc2c1fa8e145b60a7805fa9b6c92ac0746fccc37ccb0529446ae68a8581916bfc95c353306d76ba+8
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50678: In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix invalid address access when enabling SCAN log level The variab2025-12-09
GHSA
GHSA-4429-w779-rp6q: In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix invalid address access when enabling SCAN log level The vari2025-12-09
OSV
wifi: brcmfmac: fix invalid address access when enabling SCAN log level2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: wifi: brcmfmac: fix invalid address access when enabling SCAN log level2025-12-09
Debian
CVE-2022-50678: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: brcmf...2022