CVE-2022-50665
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | ath11k | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's ath11k WiFi driver. It occurs because the peer_id field in a data structure (ppdu_info) is not properly initialized after a memory reset (memset), leading to a mismatch in a condition check. This causes a failure log message 'failed to find the peer with peer_id 0' to be printed when running a scan with the station disconnected. The root cause is that the peer_id is reset to 0 but not set to the expected invalid value (HAL_INVALID_PEERID), causing the check to fail and the log to appear. The fix involves resetting the peer_id to HAL_INVALID_PEERID after the memset to prevent this issue.
How can this vulnerability impact me? :
The vulnerability causes a failure log message to be printed when scanning with the station disconnected, which indicates a logic error in the WiFi driver's handling of peer IDs. There is no indication from the provided information that this leads to a security breach, system crash, or other direct impact beyond the logging of this failure message.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the kernel logs for the specific fail log message: "failed to find the peer with peer_id 0" which appears in the ath11k driver when debug_mask is set to ATH11K_DBG_DATA. To detect this, you can enable the debug mask for ATH11K_DBG_DATA and then monitor the kernel log using commands such as: dmesg | grep 'failed to find the peer with peer_id 0' or journalctl -k | grep 'failed to find the peer with peer_id 0'.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to apply the patch that resets the peer_id to HAL_INVALID_PEERID after memset of ppdu_info in the ath11k_dp_rx_process_mon_status() function, as described in the fix. Until the patch is applied, monitoring for the fail log can help identify the issue. Updating the Linux kernel to a version that includes this fix is the recommended step.