U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-50740 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs() Syzkaller reports a long-known leak of urbs in ath9k_hif_usb_dealloc_tx_urbs(). The cause of the leak is that usb_get_urb() is called but usb_free_urb() (or usb_put_urb()) is not called inside usb_kill_urb() as urb->dev or urb->ep fields have not been initialized and usb_kill_urb() returns immediately. The patch removes trying to kill urbs located in hif_dev->tx.tx_buf because hif_dev->tx.tx_buf is not supposed to contain urbs which are in pending state (the pending urbs are stored in hif_dev->tx.tx_pending). The tx.tx_lock is acquired so there should not be any changes in the list. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/08aa0537ec8cf29ceccae98acc1a534fc12598c1 kernel.org
https://git.kernel.org/stable/c/134ae5eba41294eff76e4be20d6001b8f0192207 kernel.org
https://git.kernel.org/stable/c/472312fef2b9eccaa03bd59e0ab2527da945e736 kernel.org
https://git.kernel.org/stable/c/9850791d389b342ae6e573fe8198db0b4d338352 kernel.org
https://git.kernel.org/stable/c/c05189a429fdb371dd455c3c466d67ac2ebff152 kernel.org
https://git.kernel.org/stable/c/c2a94de38c74e86f49124ac14f093d6a5c377a90 kernel.org
https://git.kernel.org/stable/c/c3fb3e9a2c0c1a0fa492d90eb19bcfa92a5f884d kernel.org
https://git.kernel.org/stable/c/d856f7574bcc1d81de565a857caf32f122cd7ce0 kernel.org
https://git.kernel.org/stable/c/eddbb8f7620f9f8008b090a6e10c460074ca575a kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-50740
NVD Published Date:
12/24/2025
NVD Last Modified:
12/24/2025
Source:
kernel.org