In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: avoid referencing uninit memory in ath9kwmictrlrx For the reasons also described in commit b383e8abed41 ("wifi: ath9k: avoid uninit memory read in ath9khtcrxmsg()"), ath9khtcrxmsg() should validate pktlen before accessing the SKB. For example, the obtained SKB may have been badly constructed with pktlen = 8. In this case, the SKB can only contain a valid htcframehdr but after being processed in ath9khtcrxmsg() and passed to ath9kwmictrlrx() endpoint RX handler, it is expected to have a WMI command header which should be located inside its data payload. Implement sanity checking inside ath9kwmictrlrx(). Otherwise, uninit memory can be referenced. Tested on Qualcomm Atheros Communications AR9271 802.11n . Found by Linux Verification Center (linuxtesting.org) with Syzkaller.