CVE-2022-50714

Source
https://cve.org/CVERecord?id=CVE-2022-50714
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50714.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50714
Downstream
Related
Published
2025-12-24T12:22:39.059Z
Modified
2026-01-30T02:32:20.622260Z
Summary
wifi: mt76: mt7921e: fix rmmod crash in driver reload test
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921e: fix rmmod crash in driver reload test

In insmod/rmmod stress test, the following crash dump shows up immediately. The problem is caused by missing mt76dev in mt7921pci_remove(). We should make sure the drvdata is ready before probe() finished.

[168.862789] ================================================================== [168.862797] BUG: KASAN: user-memory-access in trytograbpending+0x59/0x480 [168.862805] Write of size 8 at addr 0000000000006df0 by task rmmod/5361 [168.862812] CPU: 7 PID: 5361 Comm: rmmod Tainted: G OE 5.19.0-rc6 #1 [168.862816] Hardware name: Intel(R) Client Systems NUC8i7BEH/NUC8BEB, 05/04/2020 [168.862820] Call Trace: [168.862822] <TASK> [168.862825] dumpstacklvl+0x49/0x63 [168.862832] printreport.cold+0x493/0x6b7 [168.862845] kasanreport+0xa7/0x120 [168.862857] kasancheckrange+0x163/0x200 [168.862861] _kasancheckwrite+0x14/0x20 [168.862866] trytograbpending+0x59/0x480 [168.862870] _cancelworktimer+0xbb/0x340 [168.862898] cancelworksync+0x10/0x20 [168.862902] mt7921pciremove+0x61/0x1c0 [mt7921e] [168.862909] pcideviceremove+0xa3/0x1d0 [168.862914] deviceremove+0xc4/0x170 [168.862920] devicereleasedriverinternal+0x163/0x300 [168.862925] driverdetach+0xc7/0x1a0 [168.862930] busremovedriver+0xeb/0x2d0 [168.862935] driverunregister+0x71/0xb0 [168.862939] pciunregisterdriver+0x30/0x230 [168.862944] mt7921pcidriverexit+0x10/0x1b [mt7921e] [168.862949] _x64sysdeletemodule+0x2f9/0x4b0 [168.862968] dosyscall64+0x38/0x90 [168.862973] entrySYSCALL64after_hwframe+0x63/0xcd

Test steps: 1. insmode 2. do not ifup 3. rmmod quickly (within 1 second)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50714.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1c71e03afe4b457a15e50de40006b927dfc00755
Fixed
1034d8e08508830161377f136a060e78fc24f2a5
Fixed
ccda3ebdae719d348f90563b6719fba4929ae283
Fixed
b5a62d612b7baf6e09884e4de94decb6391d6a9d

Affected versions

v5.*
v5.17
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.19.1
v5.19.10
v5.19.11
v5.19.12
v5.19.13
v5.19.14
v5.19.15
v5.19.16
v5.19.2
v5.19.3
v5.19.4
v5.19.5
v5.19.6
v5.19.7
v5.19.8
v5.19.9
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50714.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50714.json"