CVE-2022-50871
wifi: ath11k: Fix qmi_msg_handler data structure initialization
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix qmi_msg_handler data structure initialization qmi_msg_handler is required to be null terminated by QMI module. There might be a case where a handler for a msg id is not present in the handlers array which can lead to infinite loop while searching the handler and therefore out of bound access in qmi_invoke_handler(). Hence update the initialization in qmi_msg_handler data structure. Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 30, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
d5c65159f2895379e11ca13f62feabe93278985d < d5d71de448f36e34592f7c81b5e300d3e8dbb735 d5c65159f2895379e11ca13f62feabe93278985d < a10e1530c424bb277b4edc7def0195857a548495 d5c65159f2895379e11ca13f62feabe93278985d < ed3725e15a154ebebf44e0c34806c57525483f92
Linux / Linux
5.6