CVE-2022-50533
wifi: mac80211: mlme: fix null-ptr deref on failed assoc
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null-ptr deref on failed assoc If association to an AP without a link 0 fails, then we crash in tracing because it assumes that either ap_mld_addr or link 0 BSS is valid, since we clear sdata->vif.valid_links and then don't add the ap_mld_addr to the struct. Since we clear also sdata->vif.cfg.ap_addr, keep a local copy of it and assign it earlier, before clearing valid_links, to fix this.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 7, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
81151ce462e533551f3284bfdb8e0f461c9220e6 < c695dfba8dfb82dc7ace4f22be088916cbf621ca 81151ce462e533551f3284bfdb8e0f461c9220e6 < bb7743955a929e44b308cc3f63f8cc03873c1bee 81151ce462e533551f3284bfdb8e0f461c9220e6 < 78a6a43aaf87180ec7425a2a90468e1b4d09a1ec
Linux / Linux
6.0