{
  "threat_severity" : "Moderate",
  "public_date" : "2025-06-18T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: wifi: rtw89: 8852a: rfk: fix div 0 exception",
    "id" : "2373427",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2373427"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nwifi: rtw89: 8852a: rfk: fix div 0 exception\nThe DPK is a kind of RF calibration whose algorithm is to fine tune\nparameters and calibrate, and check the result. If the result isn't good\nenough, it could adjust parameters and try again.\nThis issue is to read and show the result, but it could be a negative\ncalibration result that causes divisor 0 and core dump. So, fix it by\nphy_div() that does division only if divisor isn't zero; otherwise,\nzero is adopted.\ndivide error: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 1 PID: 728 Comm: wpa_supplicant Not tainted 5.10.114-16019-g462a1661811a #1 <HASH:d024 28>\nRIP: 0010:rtw8852a_dpk+0x14ae/0x288f [rtw89_core]\nRSP: 0018:ffffa9bb412a7520 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 00000000000180fc RDI: ffffa141d01023c0\nRBP: ffffa9bb412a76a0 R08: 0000000000001319 R09: 00000000ffffff92\nR10: ffffffffc0292de3 R11: ffffffffc00d2f51 R12: 0000000000000000\nR13: ffffa141d01023c0 R14: ffffffffc0290250 R15: ffffa141d0102638\nFS:  00007fa99f5c2740(0000) GS:ffffa142e5e80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000013e8e010 CR3: 0000000110d2c000 CR4: 0000000000750ee0\nPKRU: 55555554\nCall Trace:\nrtw89_core_sta_add+0x95/0x9c [rtw89_core <HASH:d239 29>]\nrtw89_ops_sta_state+0x5d/0x108 [rtw89_core <HASH:d239 29>]\ndrv_sta_state+0x115/0x66f [mac80211 <HASH:81fe 30>]\nsta_info_insert_rcu+0x45c/0x713 [mac80211 <HASH:81fe 30>]\nsta_info_insert+0xf/0x1b [mac80211 <HASH:81fe 30>]\nieee80211_prep_connection+0x9d6/0xb0c [mac80211 <HASH:81fe 30>]\nieee80211_mgd_auth+0x2aa/0x352 [mac80211 <HASH:81fe 30>]\ncfg80211_mlme_auth+0x160/0x1f6 [cfg80211 <HASH:00cd 31>]\nnl80211_authenticate+0x2e5/0x306 [cfg80211 <HASH:00cd 31>]\ngenl_rcv_msg+0x371/0x3a1\n? nl80211_stop_sched_scan+0xe5/0xe5 [cfg80211 <HASH:00cd 31>]\n? genl_rcv+0x36/0x36\nnetlink_rcv_skb+0x8a/0xf9\ngenl_rcv+0x28/0x36\nnetlink_unicast+0x27b/0x3a0\nnetlink_sendmsg+0x2aa/0x469\nsock_sendmsg_nosec+0x49/0x4d\n____sys_sendmsg+0xe5/0x213\n__sys_sendmsg+0xec/0x157\n? syscall_enter_from_user_mode+0xd7/0x116\ndo_syscall_64+0x43/0x55\nentry_SYSCALL_64_after_hwframe+0x44/0xa9\nRIP: 0033:0x7fa99f6e689b" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2022-11-08T00:00:00Z",
    "advisory" : "RHSA-2022:7683",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-425.3.1.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2022-11-15T00:00:00Z",
    "advisory" : "RHSA-2022:8267",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-162.6.1.el9_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2022-11-15T00:00:00Z",
    "advisory" : "RHSA-2022:8267",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-162.6.1.el9_1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-50178\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50178\nhttps://lore.kernel.org/linux-cve-announce/2025061831-CVE-2022-50178-52a0@gregkh/T" ],
  "name" : "CVE-2022-50178",
  "csaw" : false
}