CVE-2022-50880 — Use After Free in Linux
Severity
6.4MEDIUM
No vectorEPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()
When peer delete failed in a disconnect operation, use-after-free
detected by KFENCE in below log. It is because for each vdev_id and
address, it has only one struct ath10k_peer, it is allocated in
ath10k_peer_map_event(). When connected to an AP, it has more than
one HTT_T2H_MSG_TYPE_PEER_MAP reported from firmware, then the
array peer_map of struct ath…
Affected Packages4 packages
▶CVEListV5linux/linuxd0eeafad118940fe445ca00f45be5624fea2ec34 — 15604ab67179ae27ea3c7fb24b6df32b143257c4+9
🔴Vulnerability Details
3GHSA▶
GHSA-pjr7-jcmf-p5h8: In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()
When p↗2025-12-30
OSV▶
CVE-2022-50880: In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When pee↗2025-12-30