CVE-2022-50627

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/12/2025
Last modified:
08/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath11k: fix monitor mode bringup crash<br /> <br /> When the interface is brought up in monitor mode, it leads<br /> to NULL pointer dereference crash. This crash happens when<br /> the packet type is extracted for a SKB. This extraction<br /> which is present in the received msdu delivery path,is<br /> not needed for the monitor ring packets since they are<br /> all RAW packets. Hence appending the flags with<br /> "RX_FLAG_ONLY_MONITOR" to skip that extraction.<br /> <br /> Observed calltrace:<br /> <br /> Unable to handle kernel NULL pointer dereference at virtual address<br /> 0000000000000064<br /> Mem abort info:<br /> ESR = 0x0000000096000004<br /> EC = 0x25: DABT (current EL), IL = 32 bits<br /> SET = 0, FnV = 0<br /> EA = 0, S1PTW = 0<br /> FSC = 0x04: level 0 translation fault<br /> Data abort info:<br /> ISV = 0, ISS = 0x00000004<br /> CM = 0, WnR = 0<br /> user pgtable: 4k pages, 48-bit VAs, pgdp=0000000048517000<br /> [0000000000000064] pgd=0000000000000000, p4d=0000000000000000<br /> Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP<br /> Modules linked in: ath11k_pci ath11k qmi_helpers<br /> CPU: 2 PID: 1781 Comm: napi/-271 Not tainted<br /> 6.1.0-rc5-wt-ath-656295-gef907406320c-dirty #6<br /> Hardware name: Qualcomm Technologies, Inc. IPQ8074/AP-HK10-C2 (DT)<br /> pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : ath11k_hw_qcn9074_rx_desc_get_decap_type+0x34/0x60 [ath11k]<br /> lr : ath11k_hw_qcn9074_rx_desc_get_decap_type+0x5c/0x60 [ath11k]<br /> sp : ffff80000ef5bb10<br /> x29: ffff80000ef5bb10 x28: 0000000000000000 x27: ffff000007baafa0<br /> x26: ffff000014a91ed0 x25: 0000000000000000 x24: 0000000000000000<br /> x23: ffff800002b77378 x22: ffff000014a91ec0 x21: ffff000006c8d600<br /> x20: 0000000000000000 x19: ffff800002b77740 x18: 0000000000000006<br /> x17: 736564203634343a x16: 656e694c20657079 x15: 0000000000000143<br /> x14: 00000000ffffffea x13: ffff80000ef5b8b8 x12: ffff80000ef5b8c8<br /> x11: ffff80000a591d30 x10: ffff80000a579d40 x9 : c0000000ffffefff<br /> x8 : 0000000000000003 x7 : 0000000000017fe8 x6 : ffff80000a579ce8<br /> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000<br /> x2 : 3a35ec12ed7f8900 x1 : 0000000000000000 x0 : 0000000000000052<br /> Call trace:<br /> ath11k_hw_qcn9074_rx_desc_get_decap_type+0x34/0x60 [ath11k]<br /> ath11k_dp_rx_deliver_msdu.isra.42+0xa4/0x3d0 [ath11k]<br /> ath11k_dp_rx_mon_deliver.isra.43+0x2f8/0x458 [ath11k]<br /> ath11k_dp_rx_process_mon_rings+0x310/0x4c0 [ath11k]<br /> ath11k_dp_service_srng+0x234/0x338 [ath11k]<br /> ath11k_pcic_ext_grp_napi_poll+0x30/0xb8 [ath11k]<br /> __napi_poll+0x5c/0x190<br /> napi_threaded_poll+0xf0/0x118<br /> kthread+0xf4/0x110<br /> ret_from_fork+0x10/0x20<br /> <br /> Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1

Impact