VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50871

CVE-2022-50871

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: Fix qmi_msg_handler data structure initialization

qmi_msg_handler is required to be null terminated by QMI module. There might be a case where a handler for a msg id is not present in the handlers array which can lead to infinite loop while searching the handler and therefore out of bound access in qmi_invoke_handler(). Hence update the initialization in qmi_msg_handler data structure.

Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null-termination flaw in ath11k's QMI handler array can cause an infinite loop and out-of-bounds access in the Linux kernel.

In the Linux kernel's ath11k wireless driver, the qmi_msg_handler data structure was not properly null-terminated. The QMI module requires the handler array to end with a null entry; without it, if a handler for a particular message ID is missing, the search loop may continue past the array boundaries, leading to an infinite loop and out-of-bounds memory access in qmi_invoke_handler() [1].

The vulnerability is exploitable by sending a crafted QMI message that does not have a corresponding handler in the array. This can be done without authentication if the attacker has access to the QMI interface, which is typically accessible from the host to the firmware on the wireless card [1].

An attacker who successfully triggers the out-of-bounds access could cause a denial of service (system crash or hang) or potentially escalate privileges within the kernel context. As of the fix, this issue is known to affect IPQ8074 hardware and is fixed by Linux kernel commit ed3725e15a15 [1].

The patch is included in stable kernel updates. System administrators should apply the latest kernel updates from their distribution. There is no workaround other than patching the kernel.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.