CVE-2022-49131
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ath11k: fix kernel panic during unload/load ath11k modules<br />
<br />
Call netif_napi_del() from ath11k_ahb_free_ext_irq() to fix<br />
the following kernel panic when unload/load ath11k modules<br />
for few iterations.<br />
<br />
[ 971.201365] Unable to handle kernel paging request at virtual address 6d97a208<br />
[ 971.204227] pgd = 594c2919<br />
[ 971.211478] [6d97a208] *pgd=00000000<br />
[ 971.214120] Internal error: Oops: 5 [#1] PREEMPT SMP ARM<br />
[ 971.412024] CPU: 2 PID: 4435 Comm: insmod Not tainted 5.4.89 #0<br />
[ 971.434256] Hardware name: Generic DT based system<br />
[ 971.440165] PC is at napi_by_id+0x10/0x40<br />
[ 971.445019] LR is at netif_napi_add+0x160/0x1dc<br />
<br />
[ 971.743127] (napi_by_id) from [] (netif_napi_add+0x160/0x1dc)<br />
[ 971.751295] (netif_napi_add) from [] (ath11k_ahb_config_irq+0xf8/0x414 [ath11k_ahb])<br />
[ 971.759164] (ath11k_ahb_config_irq [ath11k_ahb]) from [] (ath11k_ahb_probe+0x40c/0x51c [ath11k_ahb])<br />
[ 971.768567] (ath11k_ahb_probe [ath11k_ahb]) from [] (platform_drv_probe+0x48/0x94)<br />
[ 971.779670] (platform_drv_probe) from [] (really_probe+0x1c8/0x450)<br />
[ 971.789389] (really_probe) from [] (driver_probe_device+0x15c/0x1b8)<br />
[ 971.797547] (driver_probe_device) from [] (device_driver_attach+0x44/0x60)<br />
[ 971.805795] (device_driver_attach) from [] (__driver_attach+0x124/0x140)<br />
[ 971.814822] (__driver_attach) from [] (bus_for_each_dev+0x58/0xa4)<br />
[ 971.823328] (bus_for_each_dev) from [] (bus_add_driver+0xf0/0x1e8)<br />
[ 971.831662] (bus_add_driver) from [] (driver_register+0xa8/0xf0)<br />
[ 971.839822] (driver_register) from [] (do_one_initcall+0x78/0x1ac)<br />
[ 971.847638] (do_one_initcall) from [] (do_init_module+0x54/0x200)<br />
[ 971.855968] (do_init_module) from [] (load_module+0x1e30/0x1ffc)<br />
[ 971.864126] (load_module) from [] (sys_init_module+0x134/0x17c)<br />
[ 971.871852] (sys_init_module) from [] (ret_fast_syscall+0x0/0x50)<br />
<br />
Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.6.0.1-00760-QCAHKSWPL_SILICONZ-1
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.111 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/22b59cb965f79ee1accf83172441c9ca0ecb632a
- https://git.kernel.org/stable/c/38e488db194dc16d2eb23c77c6a8c04ff583c40d
- https://git.kernel.org/stable/c/699e8c87e5c406af0f0606f40eeebd248c51b702
- https://git.kernel.org/stable/c/c4b7653af62a9a5efe2856183d1f987c5429758b
- https://git.kernel.org/stable/c/c6a815f5abdf324108799829dd19ea62fef4bf95



