CVE-2022-49523
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49523 is a vulnerability in the Linux kernel's ath11k wireless driver that can lead to a NULL pointer dereference. The issue occurs when removing the ath11k module (using rmmod) while spectral scan is enabled, causing the system to crash (Kernel Git).

Technical details

The vulnerability manifests when the spectral scan feature is enabled and the ath11k module is being removed. The issue stems from improper cleanup sequence in the spectral_deinit API, where the spectral dbring is cleaned before disabling the spectral scan in firmware. This leads to a NULL pointer dereference at virtual address 0x00000008, causing a kernel crash (Kernel Git).

Impact

When exploited, this vulnerability results in a kernel crash (NULL pointer dereference), leading to a denial of service condition. The crash affects systems running the Linux kernel with the ath11k wireless driver module (Kernel Git).

Mitigation and workarounds

The fix involves sending a spectral scan disable WMI command to firmware before cleaning the spectral dbring in the spectral_deinit API. This ensures proper cleanup sequence and prevents the NULL pointer dereference. Users should update to a patched kernel version that includes this fix (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management