Upstream information

CVE-2022-49543 at MITRE

Description

In the Linux kernel, the following vulnerability has been resolved:

ath11k: fix the warning of dev_wake in mhi_pm_disable_transition()

When test device recovery with below command, it has warning in message
as below.
echo assert > /sys/kernel/debug/ath11k/wcn6855\ hw2.0/simulate_fw_crash
echo assert > /sys/kernel/debug/ath11k/qca6390\ hw2.0/simulate_fw_crash

warning message:
[ 1965.642121] ath11k_pci 0000:06:00.0: simulating firmware assert crash
[ 1968.471364] ieee80211 phy0: Hardware restart was requested
[ 1968.511305] ------------[ cut here ]------------
[ 1968.511368] WARNING: CPU: 3 PID: 1546 at drivers/bus/mhi/core/pm.c:505 mhi_pm_disable_transition+0xb37/0xda0 [mhi]
[ 1968.511443] Modules linked in: ath11k_pci ath11k mac80211 libarc4 cfg80211 qmi_helpers qrtr_mhi mhi qrtr nvme nvme_core
[ 1968.511563] CPU: 3 PID: 1546 Comm: kworker/u17:0 Kdump: loaded Tainted: G W 5.17.0-rc3-wt-ath+ #579
[ 1968.511629] Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021
[ 1968.511704] Workqueue: mhi_hiprio_wq mhi_pm_st_worker [mhi]
[ 1968.511787] RIP: 0010:mhi_pm_disable_transition+0xb37/0xda0 [mhi]
[ 1968.511870] Code: a9 fe ff ff 4c 89 ff 44 89 04 24 e8 03 46 f6 e5 44 8b 04 24 41 83 f8 01 0f 84 21 fe ff ff e9 4c fd ff ff 0f 0b e9 af f8 ff ff <0f> 0b e9 5c f8 ff ff 48 89 df e8 da 9e ee e3 e9 12 fd ff ff 4c 89
[ 1968.511923] RSP: 0018:ffffc900024efbf0 EFLAGS: 00010286
[ 1968.511969] RAX: 00000000ffffffff RBX: ffff88811d241250 RCX: ffffffffc0176922
[ 1968.512014] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888118a90a24
[ 1968.512059] RBP: ffff888118a90800 R08: 0000000000000000 R09: ffff888118a90a27
[ 1968.512102] R10: ffffed1023152144 R11: 0000000000000001 R12: ffff888118a908ac
[ 1968.512229] R13: ffff888118a90928 R14: dffffc0000000000 R15: ffff888118a90a24
[ 1968.512310] FS: 0000000000000000(0000) GS:ffff888234200000(0000) knlGS:0000000000000000
[ 1968.512405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1968.512493] CR2: 00007f5538f443a8 CR3: 000000016dc28001 CR4: 00000000003706e0
[ 1968.512587] Call Trace:
[ 1968.512672] <TASK>
[ 1968.512751] ? _raw_spin_unlock_irq+0x1f/0x40
[ 1968.512859] mhi_pm_st_worker+0x3ac/0x790 [mhi]
[ 1968.512959] ? mhi_pm_mission_mode_transition.isra.0+0x7d0/0x7d0 [mhi]
[ 1968.513063] process_one_work+0x86a/0x1400
[ 1968.513184] ? pwq_dec_nr_in_flight+0x230/0x230
[ 1968.513312] ? move_linked_works+0x125/0x290
[ 1968.513416] worker_thread+0x6db/0xf60
[ 1968.513536] ? process_one_work+0x1400/0x1400
[ 1968.513627] kthread+0x241/0x2d0
[ 1968.513733] ? kthread_complete_and_exit+0x20/0x20
[ 1968.513821] ret_from_fork+0x22/0x30
[ 1968.513924] </TASK>

Reason is mhi_deassert_dev_wake() from mhi_device_put() is called
but mhi_assert_dev_wake() from __mhi_device_get_sync() is not called
in progress of recovery. Commit 8e0559921f9a ("bus: mhi: core:
Skip device wake in error or shutdown state") add check for the
pm_state of mhi in __mhi_device_get_sync(), and the pm_state is not
the normal state untill recovery is completed, so it leads the
dev_wake is not 0 and above warning print in mhi_pm_disable_transition()
while checking mhi_cntrl->dev_wake.

Add check in ath11k_pci_write32()/ath11k_pci_read32() to skip call
mhi_device_put() if mhi_device_get_sync() does not really do wake,
then the warning gone.

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03003-QCAHSPSWPL_V1_V2_SILICONZ_LITE-2

SUSE information

Overall state of this security issue: New

This issue is currently rated as having not set severity.

No SUSE Bugzilla entries cross referenced.

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under general support and receiving all security fixes.
SUSE Linux Enterprise Desktop 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Desktop 15 SP6 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP6 kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP6 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP6 kernel-source-azure Analysis
SUSE Linux Enterprise Live Patching 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Micro 5.1 kernel-default Analysis
SUSE Linux Enterprise Micro 5.1 kernel-rt Analysis
SUSE Linux Enterprise Micro 5.1 kernel-source Analysis
SUSE Linux Enterprise Micro 5.1 kernel-source-rt Analysis
SUSE Linux Enterprise Micro 5.2 kernel-default Analysis
SUSE Linux Enterprise Micro 5.2 kernel-rt Analysis
SUSE Linux Enterprise Micro 5.2 kernel-source Analysis
SUSE Linux Enterprise Micro 5.2 kernel-source-rt Analysis
SUSE Linux Enterprise Micro 5.3 kernel-default Analysis
SUSE Linux Enterprise Micro 5.3 kernel-rt Analysis
SUSE Linux Enterprise Micro 5.3 kernel-source Analysis
SUSE Linux Enterprise Micro 5.3 kernel-source-rt Analysis
SUSE Linux Enterprise Micro 5.4 kernel-default Analysis
SUSE Linux Enterprise Micro 5.4 kernel-rt Analysis
SUSE Linux Enterprise Micro 5.4 kernel-source Analysis
SUSE Linux Enterprise Micro 5.4 kernel-source-rt Analysis
SUSE Linux Enterprise Micro 5.5 kernel-default Analysis
SUSE Linux Enterprise Micro 5.5 kernel-source Analysis
SUSE Linux Enterprise Micro 5.5 kernel-source-rt Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Module for Public Cloud 15 SP6 kernel-source-azure Analysis
SUSE Linux Enterprise Real Time 15 SP6 kernel-source-rt Analysis
SUSE Linux Enterprise Server 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Server 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP6 kernel-source-azure Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-source-azure Analysis
SUSE Linux Enterprise Workstation Extension 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Workstation Extension 15 SP6 kernel-source Analysis
SUSE Linux Micro 6.0 kernel-default Analysis
SUSE Linux Micro 6.0 kernel-source Analysis
SUSE Linux Micro 6.0 kernel-source-rt Analysis
SUSE Linux Micro 6.1 kernel-default Analysis
SUSE Linux Micro 6.1 kernel-source Analysis
SUSE Linux Micro 6.1 kernel-source-rt Analysis
SUSE Manager Proxy 4.3 kernel-default Analysis
SUSE Manager Proxy 4.3 kernel-source Analysis
SUSE Manager Retail Branch Server 4.3 kernel-default Analysis
SUSE Manager Retail Branch Server 4.3 kernel-source Analysis
SUSE Manager Server 4.3 kernel-default Analysis
SUSE Manager Server 4.3 kernel-source Analysis
SUSE Real Time Module 15 SP6 kernel-source-rt Analysis
openSUSE Leap 15.6 kernel-default Analysis
openSUSE Leap 15.6 kernel-source Analysis
openSUSE Leap 15.6 kernel-source-azure Analysis
openSUSE Leap 15.6 kernel-source-rt Analysis
Products under Long Term Service Pack support and receiving important and critical security fixes.
SUSE Linux Enterprise High Availability Extension 12 SP5 kernel-default Analysis
SUSE Linux Enterprise High Availability Extension 12 SP5 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP3 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP4 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5 kernel-source-azure Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS kernel-source Analysis
SUSE Linux Enterprise Live Patching 12 SP5 kernel-default Analysis
SUSE Linux Enterprise Live Patching 12 SP5 kernel-source Analysis
SUSE Linux Enterprise Live Patching 15 SP3 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Live Patching 15 SP4 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Live Patching 15 SP5 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Module for Public Cloud 15 SP5 kernel-source-azure Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE kernel-default Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE kernel-source Analysis
SUSE Linux Enterprise Server 12 SP5 kernel-source Analysis
SUSE Linux Enterprise Server 12 SP5 kernel-source-azure Analysis
SUSE Linux Enterprise Server 12 SP5-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 12 SP5-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP5-LTSS kernel-source-azure Analysis
SUSE Linux Enterprise Server 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP3-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP3-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP4-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP4-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP5 kernel-source-azure Analysis
SUSE Linux Enterprise Server 15 SP5-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP5-LTSS kernel-source Analysis
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5 kernel-source Analysis
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5 kernel-source-azure Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP5 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP5 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP3 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP4 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP5 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP5 kernel-source-azure Analysis
Products past their end of life and not receiving proactive updates anymore.
SUSE CaaS Platform 4.0 kernel-source Analysis
SUSE Enterprise Storage 6 kernel-source Analysis
SUSE Enterprise Storage 7 kernel-source Analysis
SUSE Enterprise Storage 7.1 kernel-source Analysis
SUSE Linux Enterprise Desktop 11 SP4 kernel-source Analysis
SUSE Linux Enterprise Desktop 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Desktop 12 SP4 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP5 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP1 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP2 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15-LTSS kernel-source Analysis
SUSE Linux Enterprise Micro 5.0 kernel-default Analysis
SUSE Linux Enterprise Module for Basesystem 15 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT kernel-source Analysis
SUSE Linux Enterprise Real Time 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Real Time 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Real Time 15 SP3 kernel-source-rt Analysis
SUSE Linux Enterprise Real Time 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Real Time 15 SP4 kernel-source-rt Analysis
SUSE Linux Enterprise Real Time 15 SP5 kernel-source-rt Analysis
SUSE Linux Enterprise Server 11 SP4 kernel-source Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS kernel-default Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS kernel-source Analysis
SUSE Linux Enterprise Server 11 SP4-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2-BCL kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2-ESPOS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 12 SP2-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP4 kernel-source Analysis
SUSE Linux Enterprise Server 12 SP4-ESPOS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP4-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 12 SP4-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP1-BCL kernel-source Analysis
SUSE Linux Enterprise Server 15 SP1-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP1-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP2-BCL kernel-source Analysis
SUSE Linux Enterprise Server 15 SP2-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP2-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 SP3-BCL kernel-source Analysis
SUSE Linux Enterprise Server 15-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15-LTSS kernel-source Analysis
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP4 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP2 kernel-source Analysis
SUSE Manager Proxy 4.0 kernel-source Analysis
SUSE Manager Proxy 4.1 kernel-source Analysis
SUSE Manager Proxy 4.2 kernel-source Analysis
SUSE Manager Retail Branch Server 4.0 kernel-source Analysis
SUSE Manager Retail Branch Server 4.1 kernel-source Analysis
SUSE Manager Retail Branch Server 4.2 kernel-source Analysis
SUSE Manager Server 4.0 kernel-source Analysis
SUSE Manager Server 4.1 kernel-source Analysis
SUSE Manager Server 4.2 kernel-source Analysis
SUSE OpenStack Cloud 7 kernel-source Analysis
SUSE OpenStack Cloud 9 kernel-source Analysis
SUSE OpenStack Cloud Crowbar 9 kernel-source Analysis
SUSE Real Time Module 15 SP3 kernel-source-rt Analysis
SUSE Real Time Module 15 SP4 kernel-source-rt Analysis
SUSE Real Time Module 15 SP5 kernel-source-rt Analysis
openSUSE Leap 15.3 kernel-source Analysis
openSUSE Leap 15.3 kernel-source-rt Analysis
openSUSE Leap 15.4 kernel-source Analysis
openSUSE Leap 15.4 kernel-source-azure Analysis
openSUSE Leap 15.4 kernel-source-rt Analysis
openSUSE Leap 15.5 kernel-source Analysis
openSUSE Leap 15.5 kernel-source-azure Analysis
openSUSE Leap 15.5 kernel-source-rt Analysis


SUSE Timeline for this CVE

CVE page created: Wed Feb 26 04:23:01 2025
CVE page last modified: Wed Feb 26 12:01:39 2025