CVE-2022-50871
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Fix qmi_msg_handler data structure initialization
qmi_msg_handler is required to be null terminated by QMI module. There might be a case where a handler for a msg id is not present in the handlers array which can lead to infinite loop while searching the handler and therefore out of bound access in qmi_invoke_handler(). Hence update the initialization in qmi_msg_handler data structure.
Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null-termination flaw in ath11k's QMI handler array can cause an infinite loop and out-of-bounds access in the Linux kernel.
In the Linux kernel's ath11k wireless driver, the qmi_msg_handler data structure was not properly null-terminated. The QMI module requires the handler array to end with a null entry; without it, if a handler for a particular message ID is missing, the search loop may continue past the array boundaries, leading to an infinite loop and out-of-bounds memory access in qmi_invoke_handler() [1].
The vulnerability is exploitable by sending a crafted QMI message that does not have a corresponding handler in the array. This can be done without authentication if the attacker has access to the QMI interface, which is typically accessible from the host to the firmware on the wireless card [1].
An attacker who successfully triggers the out-of-bounds access could cause a denial of service (system crash or hang) or potentially escalate privileges within the kernel context. As of the fix, this issue is known to affect IPQ8074 hardware and is fixed by Linux kernel commit ed3725e15a15 [1].
The patch is included in stable kernel updates. System administrators should apply the latest kernel updates from their distribution. There is no workaround other than patching the kernel.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3d5d71de448f3a10e1530c424ed3725e15a15Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.