CVE-2022-50716 — Linux vulnerability
7 documents6 sources
Severity
—N/A
No vectorEPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
syzkaller reported use-after-free with the stack trace like below [1]:
[ 38.960489][ C3] ==================================================================
[ 38.963216][ C3] BUG: KASAN: use-after-free in ar5523_cmd_tx_cb+0x220/0x240
[ 38.964950][ C3] Read of size 8 at addr ffff888048e03450 by task swapper/3/0
[ 38.966363][ C3]
[ 38.967053][ C3] CPU: 3 PID: 0 Comm: swa…
Affected Packages4 packages
▶CVEListV5linux/linuxb7d572e1871df06a96a1c9591c71c5494ff6b624 — c9ba3fbf6a488da6cad1d304c5234bd8d729eba3+9
🔴Vulnerability Details
3OSV▶
CVE-2022-50716: In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out syzkaller reported use-↗2025-12-24
GHSA▶
GHSA-4m5x-vw6p-2w8c: In the Linux kernel, the following vulnerability has been resolved:
wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
syzkaller reported us↗2025-12-24