Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix qmi_msg_handler data structure initialization qmi_msg_handler is required to be null terminated by QMI module. There might be a case where a handler for a msg id is not present in the handlers array which can lead to infinite loop while searching the handler and therefore out of bound access in qmi_invoke_handler(). Hence update the initialization in qmi_msg_handler data structure. Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d5d71de448f36e34592f7c81b5e300d3e8dbb735
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a10e1530c424bb277b4edc7def0195857a548495
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ed3725e15a154ebebf44e0c34806c57525483f92
affected

Default status
affected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/d5d71de448f36e34592f7c81b5e300d3e8dbb735

git.kernel.org/...c/a10e1530c424bb277b4edc7def0195857a548495

git.kernel.org/...c/ed3725e15a154ebebf44e0c34806c57525483f92

cve.org (CVE-2022-50871)

nvd.nist.gov (CVE-2022-50871)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.