CVE-2022-50829
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb()
It is possible that skb is freed in ath9k_htc_rx_msg(), then usb_submit_urb() fails and we try to free skb again. It causes use-after-free bug. Moreover, if alloc_skb() fails, urb->context becomes NULL but rx_buf is not freed and there can be a memory leak.
The patch removes unnecessary nskb and makes skb processing more clear: it is supposed that ath9k_htc_rx_msg() either frees old skb or passes its managing to another callback function.
Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free bug in the Linux kernel's ath9k WiFi driver USB callback can lead to memory corruption or code execution.
Vulnerability
Overview
CVE-2022-50829 is a use-after-free vulnerability in the Linux kernel's ath9k WiFi driver, specifically in the ath9k_hif_usb_reg_in_cb() callback function for USB devices. The root cause is that a socket buffer (skb) can be freed inside ath9k_htc_rx_msg(), and then if usb_submit_urb() fails, the code attempts to free the same skb again, leading to a use-after-free condition. Additionally, if alloc_skb() fails, urb->context becomes NULL but rx_buf is not freed, causing a memory leak [1][2].
Exploitation
An attacker with physical access or the ability to inject malicious USB traffic into the system could trigger this bug by sending crafted USB packets to a device using the ath9k using the ath9k_htc` driver. The vulnerability is reachable from the USB completion handler, which is a common attack surface for the driver's receive path. No special privileges are required beyond the ability to interact with the USB device [3].
Impact
Successful exploitation could allow an attacker to corrupt kernel memory, potentially leading to a denial of service (system crash) or, in more severe cases, arbitrary code execution in the kernel context. The use-after-free can be leveraged to overwrite kernel objects and escalate privileges [4].
Mitigation
The fix was applied to the Linux kernel stable branches. Users should update to a kernel version containing the commit that removes the unnecessary nskb and clarifies skb ownership in the callback. No workaround is available; patching is required [1][1][2][3][4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
95e8751a977a4f127c2b4c9670c8dd2ea4b41988bd27de24898d9172822dc355f16f756aa53b9bb1a00c471fc0ad671a6dd95f2239fc8Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/0c8dd2ea4b419da96ab4953e4967e9363e2f8a4fnvd
- git.kernel.org/stable/c/355f16f756aad0c95cdaa0c14a34ab4137d32815nvd
- git.kernel.org/stable/c/53b9bb1a00c4285ee7f58a11129dbea015db61bcnvd
- git.kernel.org/stable/c/5e8751a977a49a6e00cce1a8da5ca16da83f9c8cnvd
- git.kernel.org/stable/c/71fc0ad671a62c494d2aec731baeabd3bfe6c95dnvd
- git.kernel.org/stable/c/988bd27de2484faf17afe0408db2e3d9e5ac61fcnvd
- git.kernel.org/stable/c/98d9172822dc6f38138333941984bd759a89d419nvd
- git.kernel.org/stable/c/dd95f2239fc846795fc926787c3ae0ca701c9840nvd
- git.kernel.org/stable/c/f127c2b4c967025e5c3a4ce7e13b79135d46a33dnvd
News mentions
0No linked articles in our index yet.