CVE-2022-50829
Use-After-Free and Memory Leak in Linux ath9k USB Driver
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's ath9k wireless driver, specifically in the hif_usb component. It occurs because a network buffer (skb) may be freed in the function ath9k_htc_rx_msg(), and if usb_submit_urb() fails afterward, the code attempts to free the skb again, causing a use-after-free error. Additionally, if memory allocation for skb fails, a related buffer (rx_buf) is not freed, leading to a potential memory leak. The patch fixes this by clarifying skb processing and removing unnecessary variables to ensure proper memory management.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption due to use-after-free, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges on the affected system. The memory leak could also degrade system performance over time.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the use-after-free bug in the ath9k_hif_usb_reg_in_cb() function of the Linux kernel's ath9k driver. This patch removes unnecessary skb handling and clarifies skb processing to prevent double freeing and memory leaks.