CVE-2022-50880Use After Free in Linux

CWE-416Use After Free7 documents6 sources
Severity
6.4MEDIUM
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When peer delete failed in a disconnect operation, use-after-free detected by KFENCE in below log. It is because for each vdev_id and address, it has only one struct ath10k_peer, it is allocated in ath10k_peer_map_event(). When connected to an AP, it has more than one HTT_T2H_MSG_TYPE_PEER_MAP reported from firmware, then the array peer_map of struct ath

Affected Packages4 packages

Linuxlinux/linux_kernel4.8.04.9.331+7
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxd0eeafad118940fe445ca00f45be5624fea2ec3415604ab67179ae27ea3c7fb24b6df32b143257c4+9
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-pjr7-jcmf-p5h8: In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When p2025-12-30
OSV
wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()2025-12-30
OSV
CVE-2022-50880: In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When pee2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()2025-12-30
Debian
CVE-2022-50880: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath10...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50880 Impact, Exploitability, and Mitigation Steps | Wiz