CVE-2022-50279
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.18 (inc) to 4.19.276 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.235 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.173 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.99 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.16 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a global out-of-bounds memory access bug in the Linux kernel's rtlwifi driver, specifically in the _rtl8812ae_phy_set_txpower_limit() function. The issue arises because the function _rtl8812ae_eq_n_byte(), which compares strings from tail to head, is used incorrectly with the 'prate_section' string. This causes the function to read memory outside the intended bounds, leading to a potential crash or undefined behavior. The fix involved replacing the custom comparison function with the standard strcmp() to prevent out-of-bounds access.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to access memory out of bounds, which may lead to system instability, crashes, or potential security risks such as information leakage or privilege escalation if exploited. Since it occurs in the wireless driver, it could affect network functionality or be triggered by network-related operations.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version that includes the patch which replaces the vulnerable _rtl8812ae_eq_n_byte() function with strcmp() in the rtlwifi driver. Therefore, the immediate mitigation step is to update your Linux kernel to a version that contains this fix.