CVE-2022-50871Out-of-bounds Read in Linux

CWE-125Out-of-bounds Read7 documents6 sources
Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix qmi_msg_handler data structure initialization qmi_msg_handler is required to be null terminated by QMI module. There might be a case where a handler for a msg id is not present in the handlers array which can lead to infinite loop while searching the handler and therefore out of bound access in qmi_invoke_handler(). Hence update the initialization in qmi_msg_handler data structure. Tested-on: IPQ8074 hw2.0 A

Affected Packages4 packages

Linuxlinux/linux_kernel5.6.06.0.16+1
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linuxd5c65159f2895379e11ca13f62feabe93278985dd5d71de448f36e34592f7c81b5e300d3e8dbb735+3
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
wifi: ath11k: Fix qmi_msg_handler data structure initialization2025-12-30
GHSA
GHSA-hvw4-g8mw-w34v: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix qmi_msg_handler data structure initialization qmi_msg_handler2025-12-30
OSV
CVE-2022-50871: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix qmi_msg_handler data structure initialization qmi_msg_handler is2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath11k: Fix qmi_msg_handler data structure initialization2025-12-30
Debian
CVE-2022-50871: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50871 Impact, Exploitability, and Mitigation Steps | Wiz