CVE-2022-49309

Source
https://cve.org/CVERecord?id=CVE-2022-49309
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49309.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49309
Downstream
Related
Published
2025-02-26T02:10:40.167Z
Modified
2026-04-11T12:43:51.351479Z
Summary
drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback()
Details

In the Linux kernel, the following vulnerability has been resolved:

drivers: staging: rtl8723bs: Fix deadlock in rtwsurveydoneevent_callback()

There is a deadlock in rtwsurveydoneevent_callback(), which is shown below:

(Thread 1) | (Thread 2) | settimer() rtwsurveydoneeventcallback()| modtimer() spinlockbh() //(1) | (wait a time) ... | rtwscantimeouthandler() deltimersync() | spinlock_bh() //(2) (wait timer to stop) | ...

We hold pmlmepriv->lock in position (1) of thread 1 and use deltimersync() to wait timer to stop, but timer handler also need pmlmepriv->lock in position (2) of thread 2. As a result, rtwsurveydoneevent_callback() will block forever.

This patch extracts deltimersync() from the protection of spinlockbh(), which could let timer handler to obtain the needed lock. What`s more, we change spinlockbh() in rtwscantimeouthandler() to spinlockirq(). Otherwise, spinlock_bh() will also cause deadlock() in timer handler.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49309.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Fixed
c84e5c819600ee0628f61b33d145258ae0f3d7a7
Fixed
f89f6c3ebf69623b8ea48200bd690e9e210335a1
Fixed
ce129d3efd181da5fd56f4360cc8827122afa67e
Fixed
2c41f5c341853f84b7bc2f32605d4e2782e8c279
Fixed
cc7ad0d77b51c872d629bcd98aea463a3c4109e7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49309.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.12.0
Fixed
5.10.237
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49309.json"