CVE-2022-49476
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49476 affects the Linux kernel's mt76 wireless driver, specifically the mt7921 PCI device removal functionality. The vulnerability was discovered in the mt7921pciremove function where a race condition could occur during device removal, potentially leading to a kernel NULL pointer dereference (Kernel Git).

Technical details

The vulnerability occurs when mt7921irqhandler is called while devmfreeirq is being handled during device removal. The issue stems from freeing the mt76 device too early in the removal process, which can lead to a NULL pointer dereference at address 0x0000000000000008. This happens because the interrupt handler might still be accessing device resources after they've been freed (Kernel Git).

Impact

When triggered, this vulnerability causes a kernel crash due to NULL pointer dereference, resulting in a system panic. This can lead to system instability and potential denial of service conditions (Debian Security).

Mitigation and workarounds

The issue has been fixed by postponing the mt76freedevice call until after devmfreeirq is completed. The fix moves the mt76freedevice call from mt7921eunregisterdevice to mt7921pciremove, ensuring proper resource cleanup ordering. Fixed versions are available in various Linux distributions including Debian Bullseye (5.10.234-1) and Bookworm (6.1.129-1) (Debian Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management