๐Ÿ” CVE Alert

CVE-2022-50179

UNKNOWN 0.0

ath9k: fix use-after-free in ath9k_hif_usb_rx_cb

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb Syzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The problem was in incorrect htc_handle->drv_priv initialization. Probable call trace which can trigger use-after-free: ath9k_htc_probe_device() /* htc_handle->drv_priv = priv; */ ath9k_htc_wait_for_target() <--- Failed ieee80211_free_hw() <--- priv pointer is freed <IRQ> ... ath9k_hif_usb_rx_cb() ath9k_hif_usb_rx_stream() RX_STAT_INC() <--- htc_handle->drv_priv access In order to not add fancy protection for drv_priv we can move htc_handle->drv_priv initialization at the end of the ath9k_htc_probe_device() and add helper macro to make all *_STAT_* macros NULL safe, since syzbot has reported related NULL deref in that macros [1]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
fb9987d0f748c983bb795a86f47522313f701a08 < 62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e fb9987d0f748c983bb795a86f47522313f701a08 < ab7a0ddf5f1cdec63cb21840369873806fc36d80 fb9987d0f748c983bb795a86f47522313f701a08 < e9e21206b8ea62220b486310c61277e7ebfe7cec fb9987d0f748c983bb795a86f47522313f701a08 < eccd7c3e2596b574241a7670b5b53f5322f470e5 fb9987d0f748c983bb795a86f47522313f701a08 < 03ca957c5f7b55660957eda20b5db4110319ac7a fb9987d0f748c983bb795a86f47522313f701a08 < 6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6 fb9987d0f748c983bb795a86f47522313f701a08 < b66ebac40f64336ae2d053883bee85261060bd27 fb9987d0f748c983bb795a86f47522313f701a08 < 0ac4827f78c7ffe8eef074bc010e7e34bc22f533
Linux / Linux
2.6.35

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e git.kernel.org: https://git.kernel.org/stable/c/ab7a0ddf5f1cdec63cb21840369873806fc36d80 git.kernel.org: https://git.kernel.org/stable/c/e9e21206b8ea62220b486310c61277e7ebfe7cec git.kernel.org: https://git.kernel.org/stable/c/eccd7c3e2596b574241a7670b5b53f5322f470e5 git.kernel.org: https://git.kernel.org/stable/c/03ca957c5f7b55660957eda20b5db4110319ac7a git.kernel.org: https://git.kernel.org/stable/c/6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6 git.kernel.org: https://git.kernel.org/stable/c/b66ebac40f64336ae2d053883bee85261060bd27 git.kernel.org: https://git.kernel.org/stable/c/0ac4827f78c7ffe8eef074bc010e7e34bc22f533