-

CVE-2022-50179

In the Linux kernel, the following vulnerability has been resolved:

ath9k: fix use-after-free in ath9k_hif_usb_rx_cb

Syzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The
problem was in incorrect htc_handle->drv_priv initialization.

Probable call trace which can trigger use-after-free:

ath9k_htc_probe_device()
  /* htc_handle->drv_priv = priv; */
  ath9k_htc_wait_for_target()      <--- Failed
  ieee80211_free_hw()		   <--- priv pointer is freed

<IRQ>
...
ath9k_hif_usb_rx_cb()
  ath9k_hif_usb_rx_stream()
   RX_STAT_INC()		<--- htc_handle->drv_priv access

In order to not add fancy protection for drv_priv we can move
htc_handle->drv_priv initialization at the end of the
ath9k_htc_probe_device() and add helper macro to make
all *_STAT_* macros NULL safe, since syzbot has reported related NULL
deref in that macros [1]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < ab7a0ddf5f1cdec63cb21840369873806fc36d80
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < e9e21206b8ea62220b486310c61277e7ebfe7cec
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < eccd7c3e2596b574241a7670b5b53f5322f470e5
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 03ca957c5f7b55660957eda20b5db4110319ac7a
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < b66ebac40f64336ae2d053883bee85261060bd27
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 0ac4827f78c7ffe8eef074bc010e7e34bc22f533
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.35
Status affected
Version < 2.6.35
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.291
Status unaffected
Version <= 4.19.*
Version 4.19.256
Status unaffected
Version <= 5.4.*
Version 5.4.211
Status unaffected
Version <= 5.10.*
Version 5.10.137
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.094
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String