CVE-2022-50179
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's ath9k wireless driver, specifically in the function ath9k_hif_usb_rx_cb. It occurs due to incorrect initialization of a pointer (htc_handle->drv_priv), which can lead to accessing memory that has already been freed. This happens when the driver attempts to use the freed pointer during USB receive callbacks, potentially causing system instability or crashes.
How can this vulnerability impact me? :
The use-after-free vulnerability can lead to system crashes or instability in devices using the affected Linux kernel wireless driver. This could result in denial of service or unexpected behavior in wireless communications, potentially disrupting network connectivity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the ath9k use-after-free issue in ath9k_hif_usb_rx_cb is fixed. The fix involves moving the htc_handle->drv_priv initialization to the end of ath9k_htc_probe_device() and adding NULL safety to related macros. Applying the latest kernel patches or updates from your Linux distribution that include this fix is recommended.