{"id":"CVE-2022-1679","details":"A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.","modified":"2026-04-03T13:14:35.925104253Z","published":"2022-05-16T18:15:08.410Z","related":["ALSA-2022:7933","ALSA-2022:8267","ALSA-2023:2736","ALSA-2023:2951","MGASA-2022-0305","MGASA-2022-0308","SUSE-SU-2022:2376-1","SUSE-SU-2022:2377-1","SUSE-SU-2022:2379-1","SUSE-SU-2022:2382-1","SUSE-SU-2022:2393-1","SUSE-SU-2022:2407-1","SUSE-SU-2022:2411-1","SUSE-SU-2022:2424-1","SUSE-SU-2022:2424-2","SUSE-SU-2022:2478-1","SUSE-SU-2022:2520-1","SUSE-SU-2022:2549-1","SUSE-SU-2022:2615-1","SUSE-SU-2022:2629-1","SUSE-SU-2022:2696-1","SUSE-SU-2022:2697-1","SUSE-SU-2022:2699-1","SUSE-SU-2022:2700-1","SUSE-SU-2022:2709-1","SUSE-SU-2022:2710-1","SUSE-SU-2022:2726-1","SUSE-SU-2022:2727-1","SUSE-SU-2022:2728-1","SUSE-SU-2022:2732-1","SUSE-SU-2022:2738-1","SUSE-SU-2022:2745-1","SUSE-SU-2022:2750-1","SUSE-SU-2022:2759-1","SUSE-SU-2022:2762-1","SUSE-SU-2022:2766-1","SUSE-SU-2022:2770-1","SUSE-SU-2022:2776-1","SUSE-SU-2022:2779-1","SUSE-SU-2022:2780-1","SUSE-SU-2022:2781-1","SUSE-SU-2022:2783-1","SUSE-SU-2022:2789-1","SUSE-SU-2022:2809-1","SUSE-SU-2022:2854-1","SUSE-SU-2023:0416-1","SUSE-SU-2025:02264-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02334-1","SUSE-SU-2025:02537-1","openSUSE-SU-2022:2549-1","openSUSE-SU-2024:12155-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220629-0007/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"type":"FIX","url":"https://lore.kernel.org/lkml/87ilqc7jv9.fsf%40kernel.org/t/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1679.json","unresolved_ranges":[{"events":[{"introduced":"2.6.35"},{"fixed":"4.14.291"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.256"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.211"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.137"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.61"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.18.18"}]},{"events":[{"introduced":"5.19"},{"fixed":"5.19.2"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}