CVE-2022-50831
Use-After-Free in Linux Kernel mac80211 Multi-BSSID Parsing
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel's wifi mac80211 component when parsing multi-BSSID elements. Specifically, pointers to elements are set into an allocated buffer that is freed before the function returns, leading to UAF when those pointers are accessed later. The fix involves changing the allocation method to include the scratch buffer as part of the returned structure to avoid lifetime issues.
How can this vulnerability impact me? :
The use-after-free vulnerability can lead to undefined behavior such as crashes or potential exploitation by attackers to execute arbitrary code or cause denial of service in the Linux kernel's wifi subsystem.