
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49326 is a vulnerability in the Linux kernel's rtl818x driver that affects rtl8180/rtl8185 wireless network cards. The issue was discovered when a kernel crash occurred after updating wpa_supplicant from version 2.9 to 2.10. The vulnerability was published on February 26, 2025, and received a CVSS v3.1 base score of 5.5 (MEDIUM) (NVD).
The vulnerability stems from the use of uninitialized queues in the rtl818x driver. When connecting to an access point, the driver attempts to use IEEE80211_AC_VO for priority, which wpa_supplicant 2.10 introduces. Since only the rtl8187se part of the driver supports QoS, mac80211 sets the priority to IEEE80211_AC_BE (2) for rtl8180/rtl8185 cards. This leads to a crash at line 544 in drivers/net/wireless/realtek/rtl818x/rtl8180/dev.c due to a divide-by-zero error, as ring->entries is zero for these cards and tx_ring[2] was never initialized (Kernel Patch).
When exploited, this vulnerability can cause a kernel panic on systems using rtl8180/rtl8185 wireless network cards. The issue specifically manifests when attempting to connect to an access point, potentially leading to system crashes and denial of service (NVD).
A patch has been developed and merged into the Linux kernel that prevents the use of uninitialized queues. The fix involves checking if the device supports multiple queues before attempting to map the skb priority. The patch has been confirmed to resolve the issue by the original reporter (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."