CVE-2022-50732
Description
In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8192u: Fix use after free in ieee80211_rx()
We cannot dereference the "skb" pointer after calling ieee80211_monitor_rx(), because it is a use after free.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Use-after-free in Linux kernel's rtl8192u driver when handling received packets, leading to potential memory corruption.
Vulnerability
CVE-2022-50732 is a use-after-free vulnerability in the Linux kernel's staging rtl8192u driver. In the function ieee80211_rx(), the code dereferences the skb pointer after calling ieee80211_monitor_rx(), which may have freed the skb, leading to a use-after-free condition [1][2].
Exploitation
The vulnerability can be triggered by an attacker who can send specially crafted network packets to a system using the rtl8192u driver. The driver processes received packets in ieee80211_rx() and, under certain conditions, passes the skb to ieee80211_monitor_rx(), which may free it. Subsequent use of the freed pointer allows an attacker to potentially corrupt memory or execute arbitrary code [3][4].
Impact
Successful exploitation could lead to memory corruption, system crashes, or privilege escalation. The vulnerability is in the staging tree, which may not be widely used, but affected systems should be patched.
Mitigation
The issue has been fixed in the Linux kernel through commits [1][2][3][4]. Users should update to a kernel version containing the fix, or apply the relevant patches.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
9288ada16a93adaa8045a9913b0aaec894a909c03db0ec84bfdc62d31d50ea0df8d44b555de174163c0d373df1172bbccbcc5e2dcf090Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/288ada16a93aab5aa2ebea8190aafdb35b716854nvd
- git.kernel.org/stable/c/73df1172bbcc8d45cd28e3b1a9ca2edb2f9f7ce6nvd
- git.kernel.org/stable/c/9c03db0ec84b7964a11b20706665c99a5fead332nvd
- git.kernel.org/stable/c/a0df8d44b555ae09729d6533fd4532977563c7b9nvd
- git.kernel.org/stable/c/b0aaec894a909c88117c8bda6c7c9b26cf7c744bnvd
- git.kernel.org/stable/c/bcc5e2dcf09089b337b76fc1a589f6ff95ca19acnvd
- git.kernel.org/stable/c/daa8045a991363ccdae5615d170f35aa1135e7a7nvd
- git.kernel.org/stable/c/de174163c0d319ff06d622e79130a0017c8f5a6envd
- git.kernel.org/stable/c/fdc62d31d50e4ce5d8f363fcb8299ba0e00ee6fdnvd
News mentions
0No linked articles in our index yet.