CVE-2022-49315

Source
https://cve.org/CVERecord?id=CVE-2022-49315
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49315.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49315
Downstream
Related
Published
2025-02-26T02:10:43.082Z
Modified
2026-04-11T12:43:52.484978Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop()
Details

In the Linux kernel, the following vulnerability has been resolved:

drivers: staging: rtl8192e: Fix deadlock in rtllibbeaconsstop()

There is a deadlock in rtllibbeaconsstop(), which is shown below:

(Thread 1) | (Thread 2) | rtllibsendbeacon() rtllibbeaconsstop() | modtimer() spinlockirqsave() //(1) | (wait a time) ... | rtllibsendbeaconcb() deltimersync() | spinlockirqsave() //(2) (wait timer to stop) | ...

We hold ieee->beaconlock in position (1) of thread 1 and use deltimersync() to wait timer to stop, but timer handler also need ieee->beaconlock in position (2) of thread 2. As a result, rtllibbeaconsstop() will block forever.

This patch extracts deltimersync() from the protection of spinlockirqsave(), which could let timer handler to obtain the needed lock.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49315.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
94a799425eee8225a1e3fbe5f473d2ef04002577
Fixed
4681129fda9e8555392eaaadb239ec6a6e2b3e12
Fixed
381045dc64d23a2229c47c5524c06bfc33d34446
Fixed
08bacf871c019163ccd1389d0bc957a43324967a
Fixed
64b05fa212c7e4d057676e8b7e7120c6eb2f615b
Fixed
0f69d7d5e918aa43423d86bd17ddb11b1b5e8ada
Fixed
fef451f0fbbe85dbd2962b18379d02e2965610db
Fixed
46c861009bf437a18417df24cea0d181741b7d72
Fixed
ffd4c4d5293e4985092ea45ba21cad9326e2e434
Fixed
9b6bdbd9337de3917945847bde262a34a87a6303

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49315.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.2.0
Fixed
4.9.318
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.283
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49315.json"