๐Ÿ” CVE Alert

CVE-2022-49326

MEDIUM 5.5

rtl818x: Prevent using not initialized queues

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: rtl818x: Prevent using not initialized queues Using not existing queues can panic the kernel with rtl8180/rtl8185 cards. Ignore the skb priority for those cards, they only have one tx queue. Pierre Asselin ([email protected]) reported the kernel crash in the Gentoo forum: https://forums.gentoo.org/viewtopic-t-1147832-postdays-0-postorder-asc-start-25.html He also confirmed that this patch fixes the issue. In summary this happened: After updating wpa_supplicant from 2.9 to 2.10 the kernel crashed with a "divide error: 0000" when connecting to an AP. Control port tx now tries to use IEEE80211_AC_VO for the priority, which wpa_supplicants starts to use in 2.10. Since only the rtl8187se part of the driver supports QoS, the priority of the skb is set to IEEE80211_AC_BE (2) by mac80211 for rtl8180/rtl8185 cards. rtl8180 is then unconditionally reading out the priority and finally crashes on drivers/net/wireless/realtek/rtl818x/rtl8180/dev.c line 544 without this patch: idx = (ring->idx + skb_queue_len(&ring->queue)) % ring->entries "ring->entries" is zero for rtl8180/rtl8185 cards, tx_ring[2] never got initialized.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
fd6564fcdc0bfcd432e6e939f9538acc3905d08a < b5dca2cd3f0239512da808598b4e70557eb4c2a1 fd6564fcdc0bfcd432e6e939f9538acc3905d08a < d7e30dfc166d33470bba31a42f9bbc346e5409d5 fd6564fcdc0bfcd432e6e939f9538acc3905d08a < 9d5e96cc1f1720019ce27b127a31695148d38bb0 fd6564fcdc0bfcd432e6e939f9538acc3905d08a < b8ce58ab80faaea015c206382041ff3bcf5495ff fd6564fcdc0bfcd432e6e939f9538acc3905d08a < 769ec2a824deae2f1268dfda14999a4d14d0d0c5 fd6564fcdc0bfcd432e6e939f9538acc3905d08a < 6ad81ad0cf5744738ce94c8e64051ddd80a1734c fd6564fcdc0bfcd432e6e939f9538acc3905d08a < 9ad1981fc4de3afb7db3e8eb5a6a52d4c7d0d577 fd6564fcdc0bfcd432e6e939f9538acc3905d08a < 98e55b0b876bde3353f4e074883d66ecb55c65a3 fd6564fcdc0bfcd432e6e939f9538acc3905d08a < 746285cf81dc19502ab238249d75f5990bd2d231
Linux / Linux
3.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b5dca2cd3f0239512da808598b4e70557eb4c2a1 git.kernel.org: https://git.kernel.org/stable/c/d7e30dfc166d33470bba31a42f9bbc346e5409d5 git.kernel.org: https://git.kernel.org/stable/c/9d5e96cc1f1720019ce27b127a31695148d38bb0 git.kernel.org: https://git.kernel.org/stable/c/b8ce58ab80faaea015c206382041ff3bcf5495ff git.kernel.org: https://git.kernel.org/stable/c/769ec2a824deae2f1268dfda14999a4d14d0d0c5 git.kernel.org: https://git.kernel.org/stable/c/6ad81ad0cf5744738ce94c8e64051ddd80a1734c git.kernel.org: https://git.kernel.org/stable/c/9ad1981fc4de3afb7db3e8eb5a6a52d4c7d0d577 git.kernel.org: https://git.kernel.org/stable/c/98e55b0b876bde3353f4e074883d66ecb55c65a3 git.kernel.org: https://git.kernel.org/stable/c/746285cf81dc19502ab238249d75f5990bd2d231