Skip to main content

CVE-2022-49543: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49543cvecve-2022-49543
Published: Wed Feb 26 2025 (02/26/2025, 02:13:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ath11k: fix the warning of dev_wake in mhi_pm_disable_transition() When test device recovery with below command, it has warning in message as below. echo assert > /sys/kernel/debug/ath11k/wcn6855\ hw2.0/simulate_fw_crash echo assert > /sys/kernel/debug/ath11k/qca6390\ hw2.0/simulate_fw_crash warning message: [ 1965.642121] ath11k_pci 0000:06:00.0: simulating firmware assert crash [ 1968.471364] ieee80211 phy0: Hardware restart was requested [ 1968.511305] ------------[ cut here ]------------ [ 1968.511368] WARNING: CPU: 3 PID: 1546 at drivers/bus/mhi/core/pm.c:505 mhi_pm_disable_transition+0xb37/0xda0 [mhi] [ 1968.511443] Modules linked in: ath11k_pci ath11k mac80211 libarc4 cfg80211 qmi_helpers qrtr_mhi mhi qrtr nvme nvme_core [ 1968.511563] CPU: 3 PID: 1546 Comm: kworker/u17:0 Kdump: loaded Tainted: G W 5.17.0-rc3-wt-ath+ #579 [ 1968.511629] Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021 [ 1968.511704] Workqueue: mhi_hiprio_wq mhi_pm_st_worker [mhi] [ 1968.511787] RIP: 0010:mhi_pm_disable_transition+0xb37/0xda0 [mhi] [ 1968.511870] Code: a9 fe ff ff 4c 89 ff 44 89 04 24 e8 03 46 f6 e5 44 8b 04 24 41 83 f8 01 0f 84 21 fe ff ff e9 4c fd ff ff 0f 0b e9 af f8 ff ff <0f> 0b e9 5c f8 ff ff 48 89 df e8 da 9e ee e3 e9 12 fd ff ff 4c 89 [ 1968.511923] RSP: 0018:ffffc900024efbf0 EFLAGS: 00010286 [ 1968.511969] RAX: 00000000ffffffff RBX: ffff88811d241250 RCX: ffffffffc0176922 [ 1968.512014] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888118a90a24 [ 1968.512059] RBP: ffff888118a90800 R08: 0000000000000000 R09: ffff888118a90a27 [ 1968.512102] R10: ffffed1023152144 R11: 0000000000000001 R12: ffff888118a908ac [ 1968.512229] R13: ffff888118a90928 R14: dffffc0000000000 R15: ffff888118a90a24 [ 1968.512310] FS: 0000000000000000(0000) GS:ffff888234200000(0000) knlGS:0000000000000000 [ 1968.512405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1968.512493] CR2: 00007f5538f443a8 CR3: 000000016dc28001 CR4: 00000000003706e0 [ 1968.512587] Call Trace: [ 1968.512672] <TASK> [ 1968.512751] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1968.512859] mhi_pm_st_worker+0x3ac/0x790 [mhi] [ 1968.512959] ? mhi_pm_mission_mode_transition.isra.0+0x7d0/0x7d0 [mhi] [ 1968.513063] process_one_work+0x86a/0x1400 [ 1968.513184] ? pwq_dec_nr_in_flight+0x230/0x230 [ 1968.513312] ? move_linked_works+0x125/0x290 [ 1968.513416] worker_thread+0x6db/0xf60 [ 1968.513536] ? process_one_work+0x1400/0x1400 [ 1968.513627] kthread+0x241/0x2d0 [ 1968.513733] ? kthread_complete_and_exit+0x20/0x20 [ 1968.513821] ret_from_fork+0x22/0x30 [ 1968.513924] </TASK> Reason is mhi_deassert_dev_wake() from mhi_device_put() is called but mhi_assert_dev_wake() from __mhi_device_get_sync() is not called in progress of recovery. Commit 8e0559921f9a ("bus: mhi: core: Skip device wake in error or shutdown state") add check for the pm_state of mhi in __mhi_device_get_sync(), and the pm_state is not the normal state untill recovery is completed, so it leads the dev_wake is not 0 and above warning print in mhi_pm_disable_transition() while checking mhi_cntrl->dev_wake. Add check in ath11k_pci_write32()/ath11k_pci_read32() to skip call mhi_device_put() if mhi_device_get_sync() does not really do wake, then the warning gone. Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03003-QCAHSPSWPL_V1_V2_SILICONZ_LITE-2

AI-Powered Analysis

AILast updated: 06/29/2025, 22:11:12 UTC

Technical Analysis

CVE-2022-49543 is a vulnerability identified in the Linux kernel specifically related to the ath11k wireless driver and the MHI (Modem Host Interface) bus core subsystem. The issue arises during device recovery procedures when simulating firmware crashes on certain Qualcomm wireless chipsets (e.g., WCN6855 hw2.0). The vulnerability manifests as a warning triggered by an imbalance in device wake assertion and deassertion calls within the MHI power management transition function (mhi_pm_disable_transition). Specifically, the function mhi_deassert_dev_wake() is called without a corresponding prior call to mhi_assert_dev_wake(), due to a newly introduced check in the __mhi_device_get_sync() function that skips device wake assertion if the device is not in a normal power management state during recovery. This leads to the dev_wake flag remaining non-zero and causing kernel warnings during power management transitions. The root cause is a race or logic flaw in the power management state handling during firmware crash recovery, which results in improper synchronization of device wake states. The fix involves adding checks in the ath11k PCI read/write functions to avoid calling mhi_device_put() if mhi_device_get_sync() did not assert the device wake, thereby preventing the warning. This vulnerability is primarily a kernel warning and does not appear to cause a kernel panic or direct memory corruption. It affects Linux kernel versions containing the ath11k driver and MHI bus core, particularly on systems using Qualcomm wireless chipsets such as WCN6855 and QCA6390. The issue was identified and fixed in kernel version 5.17.0-rc3-wt-ath+ and related branches. No known exploits are reported in the wild, and the vulnerability does not have an assigned CVSS score. The vulnerability is more of a stability and logging concern during recovery scenarios rather than a direct security exploit vector.

Potential Impact

For European organizations, the impact of CVE-2022-49543 is primarily related to system stability and reliability rather than direct security compromise. Systems running Linux kernels with affected ath11k drivers on Qualcomm wireless chipsets may experience kernel warnings during firmware crash recovery processes, which could complicate troubleshooting and potentially mask other critical issues. While no direct exploitation or privilege escalation is indicated, persistent warnings and improper power management transitions could lead to degraded wireless performance or intermittent connectivity issues in critical infrastructure or enterprise environments relying on these wireless modules. This might affect organizations using Linux-based network appliances, embedded systems, or IoT devices with Qualcomm wireless hardware. The absence of known exploits and the nature of the issue as a warning rather than a crash or data corruption reduces the immediate risk. However, organizations with high availability requirements or those performing automated recovery testing on affected hardware should be aware of this issue to avoid misinterpretation of kernel logs and to maintain system reliability.

Mitigation Recommendations

To mitigate the effects of CVE-2022-49543, European organizations should: 1) Ensure that Linux kernel versions deployed on systems with Qualcomm ath11k wireless chipsets are updated to versions containing the fix (post 5.17.0-rc3-wt-ath+ or equivalent stable releases). 2) Validate firmware versions and driver compatibility for Qualcomm wireless modules to ensure they incorporate the corrected power management logic. 3) Monitor kernel logs for mhi_pm_disable_transition warnings and correlate them with device recovery events to distinguish this known issue from other potential faults. 4) For critical systems, implement controlled testing environments to simulate firmware crashes and verify that the warning no longer appears after patching. 5) Collaborate with hardware vendors to confirm that device firmware and drivers are aligned with kernel fixes to prevent recurrence. 6) Avoid deploying custom kernel patches or backports without thorough testing, as improper handling of MHI power states can exacerbate the issue. 7) Maintain robust incident response procedures to quickly identify and address any unexpected wireless subsystem anomalies that may arise during recovery scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.589Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe43c9

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 10:11:12 PM

Last updated: 8/4/2025, 8:32:50 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats