CVE-2022-50881
Use-After-Free in Linux ath9k USB Driver Causes Kernel Crash
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ath | ath9k | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's ath9k wireless driver. It occurs in the function ath9k_hif_usb_disconnect() when ath9k_destroy_wmi() tries to access 'drv_priv', which has already been freed by ieee80211_free_hw(). The issue arises because the order of operations was incorrect, leading to access of freed memory. The patch fixes this by moving ath9k_destroy_wmi() before ieee80211_free_hw(), ensuring that memory is not accessed after being freed.
How can this vulnerability impact me? :
This use-after-free vulnerability can lead to undefined behavior such as system crashes, memory corruption, or potential escalation of privileges if exploited. It affects the stability and security of systems using the ath9k wireless driver, potentially causing denial of service or allowing attackers to execute arbitrary code.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the patch fixing the use-after-free in ath9k_hif_usb_disconnect(). The patch moves ath9k_destroy_wmi() before ieee80211_free_hw() to prevent accessing freed memory. Additionally, ensure that urbs from the driver are killed before freeing 'wmi' with ath9k_destroy_wmi() as their callbacks will access 'wmi'.