CVE-2022-49305

Source
https://cve.org/CVERecord?id=CVE-2022-49305
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49305.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49305
Downstream
Related
Published
2025-02-26T02:10:38.212Z
Modified
2026-04-11T11:56:52.428978Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop()
Details

In the Linux kernel, the following vulnerability has been resolved:

drivers: staging: rtl8192u: Fix deadlock in ieee80211beaconsstop()

There is a deadlock in ieee80211beaconsstop(), which is shown below:

(Thread 1) | (Thread 2) | ieee80211sendbeacon() ieee80211beaconsstop() | modtimer() spinlockirqsave() //(1) | (wait a time) ... | ieee80211sendbeaconcb() deltimersync() | spinlockirqsave() //(2) (wait timer to stop) | ...

We hold ieee->beaconlock in position (1) of thread 1 and use deltimersync() to wait timer to stop, but timer handler also need ieee->beaconlock in position (2) of thread 2. As a result, ieee80211beaconsstop() will block forever.

This patch extracts deltimersync() from the protection of spinlockirqsave(), which could let timer handler to obtain the needed lock.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49305.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8fc8598e61f6f384f3eaf1d9b09500c12af47b37
Fixed
b465bb2ebf666116c1ac745cb80c65154dc0d27e
Fixed
1fbe033c52480f7954c057510040fa6286c4ea25
Fixed
66f769762f65d957f688f3258755c6ec410bf710
Fixed
042915c1bfedd684c1d98a841794ee203200571a
Fixed
ffc9cab7243f8151be37966301307bfd3cda2db3
Fixed
b34cb54923a6e5ddefbaf358c85c922c6ab456e2
Fixed
806c7b53414934ba2a39449b31fd1a038e500273

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49305.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.33
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49305.json"