CVE-2022-50627
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | ath11k | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference crash in the Linux kernel's ath11k WiFi driver when the interface is brought up in monitor mode. The crash occurs because the driver attempts to extract the packet type from SKB packets in the received msdu delivery path, which is unnecessary for monitor ring packets since they are RAW packets. This leads to a NULL pointer dereference and kernel crash. The fix involves appending a flag to skip this extraction for monitor mode packets.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when the WiFi interface is used in monitor mode, leading to system instability or denial of service. This can disrupt network operations and potentially require a system reboot to recover.