VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50852

CVE-2022-50852

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()

Don't dereference "sar_root" after it has been freed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in mt7921_acpi_read() of the Linux kernel's MT7921 WiFi driver allows local privilege escalation.

Vulnerability

Analysis

The vulnerability is a use-after-free bug in the function mt7921_acpi_read() within the Linux kernel's mt76 wireless driver for MediaTek MT7921 chipsets. The function dereferences a pointer (sar_root) after it has been freed, leading to a use-after-free condition. This is a classic memory corruption issue that can be triggered when the driver parses ACPI tables.

Exploitation

An attacker with local access and the ability to trigger the vulnerable code path (e.g., by inserting or removing a compatible WiFi device, or by manipulating ACPI tables if possible) could exploit this flaw. The vulnerability does not require authentication beyond local user access, and the attack surface is limited to systems with affected hardware and driver loaded.

Impact

Successful exploitation could allow an attacker to escalate privileges or cause a denial of service (system crash). The use-after-free can potentially be leveraged to achieve arbitrary code execution in kernel context, as is typical for this class of bugs.

Mitigation

The fix is included in the Linux kernel stable commit referenced in [1]. Users are advised to update their kernel to a version containing the patch. As of the publication date, no workaround is available besides updating.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.