In the Linux kernel, the following vulnerability has been resolved: wifi:
mt76: mt7921e: fix crash in chip reset fail In case of drv own fail in
reset, we may need to run mac_reset several times. The sequence would
trigger system crash as the log below. Because we do not re-enable/schedule
“tx_napi” before disable it again, the process would keep waiting for state
change in napi_diable(). To avoid the problem and keep status synchronize
for each run, goto final resource handling if drv own failed. [
5857.353423] mt7921e 0000:3b:00.0: driver own failed [ 5858.433427] mt7921e
0000:3b:00.0: Timeout for driver own [ 5859.633430] mt7921e 0000:3b:00.0:
driver own failed [ 5859.633444] ------------[ cut here ]------------ [
5859.633446] WARNING: CPU: 6 at kernel/kthread.c:659 kthread_park+0x11d [
5859.633717] Workqueue: mt76 mt7921_mac_reset_work [mt7921_common] [
5859.633728] RIP: 0010:kthread_park+0x11d/0x150 [ 5859.633736] RSP:
0018:ffff8881b676fc68 EFLAGS: 00010202 … [ 5859.633766] Call Trace: [
5859.633768] <TASK> [ 5859.633771] mt7921e_mac_reset+0x176/0x6f0 [mt7921e]
[ 5859.633778] mt7921_mac_reset_work+0x184/0x3a0 [mt7921_common] [
5859.633785] ? mt7921_mac_set_timing+0x520/0x520 [mt7921_common] [
5859.633794] ? __kasan_check_read+0x11/0x20 [ 5859.633802]
process_one_work+0x7ee/0x1320 [ 5859.633810] worker_thread+0x53c/0x1240 [
5859.633818] kthread+0x2b8/0x370 [ 5859.633824] ?
process_one_work+0x1320/0x1320 [ 5859.633828] ?
kthread_complete_and_exit+0x30/0x30 [ 5859.633834] ret_from_fork+0x1f/0x30
[ 5859.633842] </TASK>
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/fa3fbe64037839f448dc569212bafc5a495d8219 (6.0-rc5)
git.kernel.org/stable/c/f7f3001723e337568017e8617974f29bc8b2f595
git.kernel.org/stable/c/fa3fbe64037839f448dc569212bafc5a495d8219
launchpad.net/bugs/cve/CVE-2022-48705
nvd.nist.gov/vuln/detail/CVE-2022-48705
security-tracker.debian.org/tracker/CVE-2022-48705
www.cve.org/CVERecord?id=CVE-2022-48705