{"id":"CVE-2022-50709","summary":"wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()\n\nsyzbot is reporting uninit value at ath9k_htc_rx_msg() [1], for\nioctl(USB_RAW_IOCTL_EP_WRITE) can call ath9k_hif_usb_rx_stream() with\npkt_len = 0 but ath9k_hif_usb_rx_stream() uses\n__dev_alloc_skb(pkt_len + 32, GFP_ATOMIC) based on an assumption that\npkt_len is valid. As a result, ath9k_hif_usb_rx_stream() allocates skb\nwith uninitialized memory and ath9k_htc_rx_msg() is reading from\nuninitialized memory.\n\nSince bytes accessed by ath9k_htc_rx_msg() is not known until\nath9k_htc_rx_msg() is called, it would be difficult to check minimal valid\npkt_len at \"if (pkt_len \u003e 2 * MAX_RX_BUF_SIZE) {\" line in\nath9k_hif_usb_rx_stream().\n\nWe have two choices. One is to workaround by adding __GFP_ZERO so that\nath9k_htc_rx_msg() sees 0 if pkt_len is invalid. The other is to let\nath9k_htc_rx_msg() validate pkt_len before accessing. This patch chose\nthe latter.\n\nNote that I'm not sure threshold condition is correct, for I can't find\ndetails on possible packet length used by this protocol.","modified":"2026-03-20T12:22:36.989365Z","published":"2025-12-24T10:55:23.194Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0350-1","SUSE-SU-2026:0369-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50709.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0d2649b288b7b9484e3d4380c0d6c4720a17e473"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2c485f4f2a64258acc5228e78ffb828c68d9e770"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4891a50f5ed8bfcb8f2a4b816b0676f398687783"},{"type":"WEB","url":"https://git.kernel.org/stable/c/84242f15f911f34aec9b22f99d1e9bff19723dbe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9661724f6206bd606ecf13acada676a9975d230b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b1b4144508adfc585e43856b31baaf9008a3beb4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b383e8abed41cc6ff1a3b34de75df9397fa4878c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f3d2a3b7e290d0bdbddfcee5a6c3d922e2b7e02a"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50709.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50709"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"fb9987d0f748c983bb795a86f47522313f701a08"},{"fixed":"f3d2a3b7e290d0bdbddfcee5a6c3d922e2b7e02a"},{"fixed":"84242f15f911f34aec9b22f99d1e9bff19723dbe"},{"fixed":"2c485f4f2a64258acc5228e78ffb828c68d9e770"},{"fixed":"9661724f6206bd606ecf13acada676a9975d230b"},{"fixed":"b1b4144508adfc585e43856b31baaf9008a3beb4"},{"fixed":"0d2649b288b7b9484e3d4380c0d6c4720a17e473"},{"fixed":"4891a50f5ed8bfcb8f2a4b816b0676f398687783"},{"fixed":"b383e8abed41cc6ff1a3b34de75df9397fa4878c"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50709.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.35"},{"fixed":"4.14.296"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.262"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.220"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.150"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.75"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.19.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.20.0"},{"fixed":"6.0.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50709.json"}}],"schema_version":"1.7.5"}