CVE-2022-50852

Source
https://cve.org/CVERecord?id=CVE-2022-50852
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50852.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50852
Downstream
Published
2025-12-30T12:15:28.444Z
Modified
2026-03-10T21:52:05.275224Z
Summary
wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921: fix use after free in mt7921acpiread()

Don't dereference "sar_root" after it has been freed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50852.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f965333e491e36adb0fa91e389fba8685b704fb6
Fixed
3ed0b382cb36f6dac9f93b3a5533cfcd699409a5
Fixed
e7de4b4979bd8d313ec837931dde936653ca82ea

Affected versions

v5.*
v5.19
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50852.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50852.json"