-
CVE-2022-50533
- EPSS 0.02%
- Published 07.10.2025 15:19:23
- Last modified 07.10.2025 16:15:37
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null-ptr deref on failed assoc If association to an AP without a link 0 fails, then we crash in tracing because it assumes that either ap_mld_addr or link 0 BSS is valid, since we clear sdata->vif.valid_links and then don't add the ap_mld_addr to the struct. Since we clear also sdata->vif.cfg.ap_addr, keep a local copy of it and assign it earlier, before clearing valid_links, to fix this.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
c695dfba8dfb82dc7ace4f22be088916cbf621ca
Version
81151ce462e533551f3284bfdb8e0f461c9220e6
Status
affected
Version <
bb7743955a929e44b308cc3f63f8cc03873c1bee
Version
81151ce462e533551f3284bfdb8e0f461c9220e6
Status
affected
Version <
78a6a43aaf87180ec7425a2a90468e1b4d09a1ec
Version
81151ce462e533551f3284bfdb8e0f461c9220e6
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.0
Status
affected
Version <
6.0
Version
0
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.028 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|