CVE-2022-50716Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out syzkaller reported use-after-free with the stack trace like below [1]: [ 38.960489][ C3] ================================================================== [ 38.963216][ C3] BUG: KASAN: use-after-free in ar5523_cmd_tx_cb+0x220/0x240 [ 38.964950][ C3] Read of size 8 at addr ffff888048e03450 by task swapper/3/0 [ 38.966363][ C3] [ 38.967053][ C3] CPU: 3 PID: 0 Comm: swa

Affected Packages4 packages

Linuxlinux/linux_kernel3.8.04.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxb7d572e1871df06a96a1c9591c71c5494ff6b624c9ba3fbf6a488da6cad1d304c5234bd8d729eba3+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out2025-12-24
OSV
CVE-2022-50716: In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out syzkaller reported use-2025-12-24
GHSA
GHSA-4m5x-vw6p-2w8c: In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out syzkaller reported us2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out2025-12-24
Debian
CVE-2022-50716: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ar552...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50716 Impact, Exploitability, and Mitigation Steps | Wiz