CVE-2022-50179

Source
https://cve.org/CVERecord?id=CVE-2022-50179
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50179.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50179
Downstream
Related
Published
2025-06-18T11:03:28.841Z
Modified
2026-04-11T12:44:54.766441Z
Summary
ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
Details

In the Linux kernel, the following vulnerability has been resolved:

ath9k: fix use-after-free in ath9khifusbrxcb

Syzbot reported use-after-free Read in ath9khifusbrxcb() [0]. The problem was in incorrect htchandle->drvpriv initialization.

Probable call trace which can trigger use-after-free:

ath9khtcprobedevice() /* htchandle->drvpriv = priv; */ ath9khtcwaitfortarget() <--- Failed ieee80211free_hw() <--- priv pointer is freed

<IRQ> ... ath9khifusbrxcb() ath9khifusbrxstream() RXSTATINC() <--- htchandle->drvpriv access

In order to not add fancy protection for drvpriv we can move htchandle->drvpriv initialization at the end of the ath9khtcprobedevice() and add helper macro to make all STAT macros NULL safe, since syzbot has reported related NULL deref in that macros [1]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50179.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fb9987d0f748c983bb795a86f47522313f701a08
Fixed
62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e
Fixed
ab7a0ddf5f1cdec63cb21840369873806fc36d80
Fixed
e9e21206b8ea62220b486310c61277e7ebfe7cec
Fixed
eccd7c3e2596b574241a7670b5b53f5322f470e5
Fixed
03ca957c5f7b55660957eda20b5db4110319ac7a
Fixed
6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6
Fixed
b66ebac40f64336ae2d053883bee85261060bd27
Fixed
0ac4827f78c7ffe8eef074bc010e7e34bc22f533

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50179.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.35
Fixed
4.14.291
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.256
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.211
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.137
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.61
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.18
Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
5.19.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50179.json"