CVE-2022-49131

In the Linux kernel, the following vulnerability has been resolved: ath11k: fix kernel panic during unload/load ath11k modules Call netif_napi_del() from ath11k_ahb_free_ext_irq() to fix the following kernel panic when unload/load ath11k modules for few iterations. [ 971.201365] Unable to handle kernel paging request at virtual address 6d97a208 [ 971.204227] pgd = 594c2919 [ 971.211478] [6d97a208] *pgd=00000000 [ 971.214120] Internal error: Oops: 5 [#1] PREEMPT SMP ARM [ 971.412024] CPU: 2 PID: 4435 Comm: insmod Not tainted 5.4.89 #0 [ 971.434256] Hardware name: Generic DT based system [ 971.440165] PC is at napi_by_id+0x10/0x40 [ 971.445019] LR is at netif_napi_add+0x160/0x1dc [ 971.743127] (napi_by_id) from [<807d89a0>] (netif_napi_add+0x160/0x1dc) [ 971.751295] (netif_napi_add) from [<7f1209ac>] (ath11k_ahb_config_irq+0xf8/0x414 [ath11k_ahb]) [ 971.759164] (ath11k_ahb_config_irq [ath11k_ahb]) from [<7f12135c>] (ath11k_ahb_probe+0x40c/0x51c [ath11k_ahb]) [ 971.768567] (ath11k_ahb_probe [ath11k_ahb]) from [<80666864>] (platform_drv_probe+0x48/0x94) [ 971.779670] (platform_drv_probe) from [<80664718>] (really_probe+0x1c8/0x450) [ 971.789389] (really_probe) from [<80664cc4>] (driver_probe_device+0x15c/0x1b8) [ 971.797547] (driver_probe_device) from [<80664f60>] (device_driver_attach+0x44/0x60) [ 971.805795] (device_driver_attach) from [<806650a0>] (__driver_attach+0x124/0x140) [ 971.814822] (__driver_attach) from [<80662adc>] (bus_for_each_dev+0x58/0xa4) [ 971.823328] (bus_for_each_dev) from [<80663a2c>] (bus_add_driver+0xf0/0x1e8) [ 971.831662] (bus_add_driver) from [<806658a4>] (driver_register+0xa8/0xf0) [ 971.839822] (driver_register) from [<8030269c>] (do_one_initcall+0x78/0x1ac) [ 971.847638] (do_one_initcall) from [<80392524>] (do_init_module+0x54/0x200) [ 971.855968] (do_init_module) from [<803945b0>] (load_module+0x1e30/0x1ffc) [ 971.864126] (load_module) from [<803948b0>] (sys_init_module+0x134/0x17c) [ 971.871852] (sys_init_module) from [<80301000>] (ret_fast_syscall+0x0/0x50) Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.6.0.1-00760-QCAHKSWPL_SILICONZ-1
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 21:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/22b59cb965f79ee1accf83172441c9ca0ecb632a - () https://git.kernel.org/stable/c/22b59cb965f79ee1accf83172441c9ca0ecb632a - Patch
References () https://git.kernel.org/stable/c/38e488db194dc16d2eb23c77c6a8c04ff583c40d - () https://git.kernel.org/stable/c/38e488db194dc16d2eb23c77c6a8c04ff583c40d - Patch
References () https://git.kernel.org/stable/c/699e8c87e5c406af0f0606f40eeebd248c51b702 - () https://git.kernel.org/stable/c/699e8c87e5c406af0f0606f40eeebd248c51b702 - Patch
References () https://git.kernel.org/stable/c/c4b7653af62a9a5efe2856183d1f987c5429758b - () https://git.kernel.org/stable/c/c4b7653af62a9a5efe2856183d1f987c5429758b - Patch
References () https://git.kernel.org/stable/c/c6a815f5abdf324108799829dd19ea62fef4bf95 - () https://git.kernel.org/stable/c/c6a815f5abdf324108799829dd19ea62fef4bf95 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ath11k: corrige el pánico del kernel durante la descarga/carga de módulos ath11k Llame a netif_napi_del() desde ath11k_ahb_free_ext_irq() para corregir el siguiente pánico del kernel al descargar/cargar módulos ath11k durante algunas iteraciones. [ 971.201365] No se puede manejar la solicitud de paginación del núcleo en la dirección virtual 6d97a208 [ 971.204227] pgd = 594c2919 [ 971.211478] [6d97a208] *pgd=00000000 [ 971.214120] Error interno: Oops: 5 [#1] PREEMPT SMP ARM [ 971.412024] CPU: 2 PID: 4435 Comm: insmod No contaminado 5.4.89 #0 [ 971.434256] Nombre del hardware: Sistema genérico basado en DT [ 971.440165] La PC está en napi_by_id+0x10/0x40 [ 971.445019] LR está en netif_napi_add+0x160/0x1dc [ 971.743127] (napi_by_id) desde [&lt;807d89a0&gt;] (netif_napi_add+0x160/0x1dc) [ 971.751295] (netif_napi_add) desde [&lt;7f1209ac&gt;] (ath11k_ahb_config_irq+0xf8/0x414 [ath11k_ahb]) [ 971.759164] (ath11k_ahb_config_irq [ath11k_ahb]) desde [&lt;7f12135c&gt;] (ath11k_ahb_probe+0x40c/0x51c [ath11k_ahb]) [ 971.768567] (ath11k_ahb_probe [ath11k_ahb]) desde [&lt;80666864&gt;] (platform_drv_probe+0x48/0x94) [ 971.779670] (platform_drv_probe) desde [&lt;80664718&gt;] (really_probe+0x1c8/0x450) [ 971.789389] (really_probe) desde [&lt;80664cc4&gt;] (driver_probe_device+0x15c/0x1b8) [ 971.797547] (driver_probe_device) desde [&lt;80664f60&gt;] (device_driver_attach+0x44/0x60) [ 971.805795] (device_driver_attach) desde [&lt;806650a0&gt;] (__driver_attach+0x124/0x140) [ 971.814822] (__driver_attach) desde [&lt;80662adc&gt;] (bus_for_each_dev+0x58/0xa4) [ 971.823328] (bus_for_each_dev) desde [&lt;80663a2c&gt;] (bus_add_driver+0xf0/0x1e8) [ 971.831662] (bus_add_driver) desde [&lt;806658a4&gt;] (driver_register+0xa8/0xf0) [ 971.839822] (driver_register) desde [&lt;8030269c&gt;] (do_one_initcall+0x78/0x1ac) [ 971.847638] (do_one_initcall) desde [&lt;80392524&gt;] (do_init_module+0x54/0x200) [ 971.855968] (do_init_module) desde [&lt;803945b0&gt;] (load_module+0x1e30/0x1ffc) [ 971.864126] (load_module) desde [&lt;803948b0&gt;] (sys_init_module+0x134/0x17c) [ 971.871852] (sys_init_module) desde [&lt;80301000&gt;] (ret_fast_syscall+0x0/0x50) Probado en: IPQ8074 hw2.0 AHB WLAN.HK.2.6.0.1-00760-QCAHKSWPL_SILICONZ-1

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-13 21:31


NVD link : CVE-2022-49131

Mitre link : CVE-2022-49131

CVE.ORG link : CVE-2022-49131


JSON object : View

Products Affected

linux

  • linux_kernel