CVE-2022-50178
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
18/06/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: rtw89: 8852a: rfk: fix div 0 exception<br />
<br />
The DPK is a kind of RF calibration whose algorithm is to fine tune<br />
parameters and calibrate, and check the result. If the result isn&#39;t good<br />
enough, it could adjust parameters and try again.<br />
<br />
This issue is to read and show the result, but it could be a negative<br />
calibration result that causes divisor 0 and core dump. So, fix it by<br />
phy_div() that does division only if divisor isn&#39;t zero; otherwise,<br />
zero is adopted.<br />
<br />
divide error: 0000 [#1] PREEMPT SMP NOPTI<br />
CPU: 1 PID: 728 Comm: wpa_supplicant Not tainted 5.10.114-16019-g462a1661811a #1 <br />
RIP: 0010:rtw8852a_dpk+0x14ae/0x288f [rtw89_core]<br />
RSP: 0018:ffffa9bb412a7520 EFLAGS: 00010246<br />
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000<br />
RDX: 0000000000000000 RSI: 00000000000180fc RDI: ffffa141d01023c0<br />
RBP: ffffa9bb412a76a0 R08: 0000000000001319 R09: 00000000ffffff92<br />
R10: ffffffffc0292de3 R11: ffffffffc00d2f51 R12: 0000000000000000<br />
R13: ffffa141d01023c0 R14: ffffffffc0290250 R15: ffffa141d0102638<br />
FS: 00007fa99f5c2740(0000) GS:ffffa142e5e80000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 0000000013e8e010 CR3: 0000000110d2c000 CR4: 0000000000750ee0<br />
PKRU: 55555554<br />
Call Trace:<br />
rtw89_core_sta_add+0x95/0x9c [rtw89_core ]<br />
rtw89_ops_sta_state+0x5d/0x108 [rtw89_core ]<br />
drv_sta_state+0x115/0x66f [mac80211 ]<br />
sta_info_insert_rcu+0x45c/0x713 [mac80211 ]<br />
sta_info_insert+0xf/0x1b [mac80211 ]<br />
ieee80211_prep_connection+0x9d6/0xb0c [mac80211 ]<br />
ieee80211_mgd_auth+0x2aa/0x352 [mac80211 ]<br />
cfg80211_mlme_auth+0x160/0x1f6 [cfg80211 ]<br />
nl80211_authenticate+0x2e5/0x306 [cfg80211 ]<br />
genl_rcv_msg+0x371/0x3a1<br />
? nl80211_stop_sched_scan+0xe5/0xe5 [cfg80211 ]<br />
? genl_rcv+0x36/0x36<br />
netlink_rcv_skb+0x8a/0xf9<br />
genl_rcv+0x28/0x36<br />
netlink_unicast+0x27b/0x3a0<br />
netlink_sendmsg+0x2aa/0x469<br />
sock_sendmsg_nosec+0x49/0x4d<br />
____sys_sendmsg+0xe5/0x213<br />
__sys_sendmsg+0xec/0x157<br />
? syscall_enter_from_user_mode+0xd7/0x116<br />
do_syscall_64+0x43/0x55<br />
entry_SYSCALL_64_after_hwframe+0x44/0xa9<br />
RIP: 0033:0x7fa99f6e689b