CVE-2022-49304

In the Linux kernel, the following vulnerability has been resolved: drivers: tty: serial: Fix deadlock in sa1100_set_termios() There is a deadlock in sa1100_set_termios(), which is shown below: (Thread 1) | (Thread 2) | sa1100_enable_ms() sa1100_set_termios() | mod_timer() spin_lock_irqsave() //(1) | (wait a time) ... | sa1100_timeout() del_timer_sync() | spin_lock_irqsave() //(2) (wait timer to stop) | ... We hold sport->port.lock in position (1) of thread 1 and use del_timer_sync() to wait timer to stop, but timer handler also need sport->port.lock in position (2) of thread 2. As a result, sa1100_set_termios() will block forever. This patch moves del_timer_sync() before spin_lock_irqsave() in order to prevent the deadlock.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Apr 2025, 20:06

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers: tty: serial: Arreglar interbloqueo en sa1100_set_termios() Hay un interbloqueo en sa1100_set_termios(), que se muestra a continuación: (Hilo 1) | (Hilo 2) | sa1100_enable_ms() sa1100_set_termios() | mod_timer() spin_lock_irqsave() //(1) | (esperar un tiempo) ... | sa1100_timeout() del_timer_sync() | spin_lock_irqsave() //(2) (esperar a que el temporizador se detenga) | ... Mantenemos sport->port.lock en la posición (1) del hilo 1 y usamos del_timer_sync() para esperar a que el temporizador se detenga, pero el controlador del temporizador también necesita sport->port.lock en la posición (2) del hilo 2. Como resultado, sa1100_set_termios() se bloqueará para siempre. Este parche mueve del_timer_sync() antes de spin_lock_irqsave() para evitar el bloqueo.
References () https://git.kernel.org/stable/c/0976808d0d171ec837d4bd3e9f4ad4a00ab703b8 - () https://git.kernel.org/stable/c/0976808d0d171ec837d4bd3e9f4ad4a00ab703b8 - Patch
References () https://git.kernel.org/stable/c/09a5958a2452ad22d0cb638711ef34ea1863a829 - () https://git.kernel.org/stable/c/09a5958a2452ad22d0cb638711ef34ea1863a829 - Patch
References () https://git.kernel.org/stable/c/2cbfc38df580bff5b2fe19f21c1a7520efcc4b3b - () https://git.kernel.org/stable/c/2cbfc38df580bff5b2fe19f21c1a7520efcc4b3b - Patch
References () https://git.kernel.org/stable/c/34d91e555e5582cffdbcbb75517bc9217866823e - () https://git.kernel.org/stable/c/34d91e555e5582cffdbcbb75517bc9217866823e - Patch
References () https://git.kernel.org/stable/c/553213432ef0c295becdc08c0207d2094468f673 - () https://git.kernel.org/stable/c/553213432ef0c295becdc08c0207d2094468f673 - Patch
References () https://git.kernel.org/stable/c/62b2caef400c1738b6d22f636c628d9f85cd4c4c - () https://git.kernel.org/stable/c/62b2caef400c1738b6d22f636c628d9f85cd4c4c - Patch
References () https://git.kernel.org/stable/c/6e2273eefab54a521d9c59efb6e1114e742bdf41 - () https://git.kernel.org/stable/c/6e2273eefab54a521d9c59efb6e1114e742bdf41 - Patch
References () https://git.kernel.org/stable/c/85e20f8bd31a46d8c60103d0274a8ebe8f47f2b2 - () https://git.kernel.org/stable/c/85e20f8bd31a46d8c60103d0274a8ebe8f47f2b2 - Patch
References () https://git.kernel.org/stable/c/920f0ae7a129ffee98a106e3bbdfd61a2a59e939 - () https://git.kernel.org/stable/c/920f0ae7a129ffee98a106e3bbdfd61a2a59e939 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-667
First Time Linux linux Kernel
Linux

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 20:06


NVD link : CVE-2022-49304

Mitre link : CVE-2022-49304

CVE.ORG link : CVE-2022-49304


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking