CVE-2022-50179

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50179
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50179.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50179
Downstream
Related
Published
2025-06-18T11:15:48Z
Modified
2025-08-09T20:01:26Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ath9k: fix use-after-free in ath9khifusbrxcb

Syzbot reported use-after-free Read in ath9khifusbrxcb() [0]. The problem was in incorrect htchandle->drvpriv initialization.

Probable call trace which can trigger use-after-free:

ath9khtcprobedevice() /* htchandle->drvpriv = priv; */ ath9khtcwaitfortarget() <--- Failed ieee80211free_hw() <--- priv pointer is freed

<IRQ> ... ath9khifusbrxcb() ath9khifusbrxstream() RXSTATINC() <--- htchandle->drvpriv access

In order to not add fancy protection for drvpriv we can move htchandle->drvpriv initialization at the end of the ath9khtcprobedevice() and add helper macro to make all _STAT_ macros NULL safe, since syzbot has reported related NULL deref in that macros [1]

References

Affected packages