CVE-2022-50709

Source
https://cve.org/CVERecord?id=CVE-2022-50709
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50709.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50709
Downstream
Related
Published
2025-12-24T10:55:23.194Z
Modified
2026-03-20T12:22:36.989365Z
Summary
wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: avoid uninit memory read in ath9khtcrx_msg()

syzbot is reporting uninit value at ath9khtcrxmsg() [1], for ioctl(USBRAWIOCTLEPWRITE) can call ath9khifusbrxstream() with pktlen = 0 but ath9khifusbrxstream() uses __devallocskb(pktlen + 32, GFPATOMIC) based on an assumption that pktlen is valid. As a result, ath9khifusbrxstream() allocates skb with uninitialized memory and ath9khtcrxmsg() is reading from uninitialized memory.

Since bytes accessed by ath9khtcrxmsg() is not known until ath9khtcrxmsg() is called, it would be difficult to check minimal valid pktlen at "if (pktlen > 2 * MAXRXBUFSIZE) {" line in ath9khifusbrx_stream().

We have two choices. One is to workaround by adding _GFPZERO so that ath9khtcrxmsg() sees 0 if pktlen is invalid. The other is to let ath9khtcrxmsg() validate pktlen before accessing. This patch chose the latter.

Note that I'm not sure threshold condition is correct, for I can't find details on possible packet length used by this protocol.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50709.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fb9987d0f748c983bb795a86f47522313f701a08
Fixed
f3d2a3b7e290d0bdbddfcee5a6c3d922e2b7e02a
Fixed
84242f15f911f34aec9b22f99d1e9bff19723dbe
Fixed
2c485f4f2a64258acc5228e78ffb828c68d9e770
Fixed
9661724f6206bd606ecf13acada676a9975d230b
Fixed
b1b4144508adfc585e43856b31baaf9008a3beb4
Fixed
0d2649b288b7b9484e3d4380c0d6c4720a17e473
Fixed
4891a50f5ed8bfcb8f2a4b816b0676f398687783
Fixed
b383e8abed41cc6ff1a3b34de75df9397fa4878c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50709.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.35
Fixed
4.14.296
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.262
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.220
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.150
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50709.json"