CVE-2022-49123
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49123 is a vulnerability in the Linux kernel's ath11k wireless driver that involves a deadlock condition causing frame flush failures. The issue was discovered when the ath11k driver failed to flush management frames because the wmimgmttx_work process had no opportunity to run within the expected timeframe (Kernel Git).

Technical details

The vulnerability occurs due to a deadlock scenario in the workqueue scheduling mechanism. When wmimgmttxwork is inserted into local->workqueue after sdata->work, and wpasupplicant acquires wdev->mtx in nl80211deauthenticate, it creates a situation where the system waits for management frames to be sent out by wmimgmttxwork. However, sdata->work becomes blocked by wdev->mtx in ieee80211stawork, preventing wmimgmttx_work from executing (Kernel Git).

Impact

The deadlock condition results in management frame transmission failures in the wireless network stack, which can lead to failed network operations and potential system hangs. This is evidenced by system warnings about failed management queue flushes and tasks being blocked for extended periods (Kernel Git).

Mitigation and workarounds

The issue was resolved by modifying the workqueue usage in the ath11k driver. The fix involves changing from using local->workqueue to ab->workqueue for scheduling wmimgmttx_work, which prevents the deadlock condition from occurring (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management