CVE-2022-50852Use After Free in Linux

CWE-416Use After Free7 documents6 sources
Severity
5.1MEDIUM
No vector
EPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix use after free in mt7921_acpi_read() Don't dereference "sar_root" after it has been freed.

Affected Packages4 packages

Linuxlinux/linux_kernel6.0.06.0.3
Debianlinux/linux_kernel< 6.0.3-1+2
CVEListV5linux/linuxf965333e491e36adb0fa91e389fba8685b704fb63ed0b382cb36f6dac9f93b3a5533cfcd699409a5+2
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-78hp-5r4f-844r: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix use after free in mt7921_acpi_read() Don't dereference "2025-12-30
OSV
wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()2025-12-30
OSV
CVE-2022-50852: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix use after free in mt7921_acpi_read() Don't dereference "sa2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()2025-12-30
Debian
CVE-2022-50852: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mt76:...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50852 Impact, Exploitability, and Mitigation Steps | Wiz