CVE-2022-50716
Use-After-Free in Linux ar5523 WiFi Driver Causes Kernel Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's ar5523 wireless driver. Specifically, if the function ar5523_cmd() times out, the device structure is freed while a callback function ar5523_cmd_tx_cb() might still try to access it, leading to use-after-free. This can cause kernel crashes or undefined behavior. The issue was fixed by canceling in-flight transmit commands if the submitted USB request timed out.
How can this vulnerability impact me? :
This vulnerability can lead to kernel crashes or instability due to use-after-free memory access in the wireless driver. This could potentially be exploited to cause denial of service or other unpredictable behavior on affected systems running the vulnerable Linux kernel.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for use-after-free errors related to the ar5523 driver. Specifically, look for KASAN (Kernel Address Sanitizer) reports with messages like 'BUG: KASAN: use-after-free in ar5523_cmd_tx_cb'. You can check the kernel log using the command: dmesg | grep ar5523_cmd_tx_cb. Additionally, monitoring for kernel crashes or warnings related to ar5523 may help detect the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to apply the patch that fixes the use-after-free issue by canceling in-flight tx commands if the submitted URB times out. Until the patch is applied, consider disabling the ar5523 wireless driver to prevent triggering the vulnerability. Updating the Linux kernel to a version that includes this fix is recommended as the definitive mitigation.