CVE-2022-49315

Source
https://cve.org/CVERecord?id=CVE-2022-49315
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49315.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49315
Downstream
Related
Published
2025-02-26T02:10:43.082Z
Modified
2026-03-12T03:25:01.482461Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop()
Details

In the Linux kernel, the following vulnerability has been resolved:

drivers: staging: rtl8192e: Fix deadlock in rtllibbeaconsstop()

There is a deadlock in rtllibbeaconsstop(), which is shown below:

(Thread 1) | (Thread 2) | rtllibsendbeacon() rtllibbeaconsstop() | modtimer() spinlockirqsave() //(1) | (wait a time) ... | rtllibsendbeaconcb() deltimersync() | spinlockirqsave() //(2) (wait timer to stop) | ...

We hold ieee->beaconlock in position (1) of thread 1 and use deltimersync() to wait timer to stop, but timer handler also need ieee->beaconlock in position (2) of thread 2. As a result, rtllibbeaconsstop() will block forever.

This patch extracts deltimersync() from the protection of spinlockirqsave(), which could let timer handler to obtain the needed lock.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49315.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
94a799425eee8225a1e3fbe5f473d2ef04002577
Fixed
4681129fda9e8555392eaaadb239ec6a6e2b3e12
Fixed
381045dc64d23a2229c47c5524c06bfc33d34446
Fixed
08bacf871c019163ccd1389d0bc957a43324967a
Fixed
64b05fa212c7e4d057676e8b7e7120c6eb2f615b
Fixed
0f69d7d5e918aa43423d86bd17ddb11b1b5e8ada
Fixed
fef451f0fbbe85dbd2962b18379d02e2965610db
Fixed
46c861009bf437a18417df24cea0d181741b7d72
Fixed
ffd4c4d5293e4985092ea45ba21cad9326e2e434
Fixed
9b6bdbd9337de3917945847bde262a34a87a6303

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49315.json"