Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-49304

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-26 Feb, 2025 | 02:10
Updated At-04 May, 2025 | 08:34
Rejected At-
Credits

drivers: tty: serial: Fix deadlock in sa1100_set_termios()

In the Linux kernel, the following vulnerability has been resolved: drivers: tty: serial: Fix deadlock in sa1100_set_termios() There is a deadlock in sa1100_set_termios(), which is shown below: (Thread 1) | (Thread 2) | sa1100_enable_ms() sa1100_set_termios() | mod_timer() spin_lock_irqsave() //(1) | (wait a time) ... | sa1100_timeout() del_timer_sync() | spin_lock_irqsave() //(2) (wait timer to stop) | ... We hold sport->port.lock in position (1) of thread 1 and use del_timer_sync() to wait timer to stop, but timer handler also need sport->port.lock in position (2) of thread 2. As a result, sa1100_set_termios() will block forever. This patch moves del_timer_sync() before spin_lock_irqsave() in order to prevent the deadlock.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:26 Feb, 2025 | 02:10
Updated At:04 May, 2025 | 08:34
Rejected At:
▼CVE Numbering Authority (CNA)
drivers: tty: serial: Fix deadlock in sa1100_set_termios()

In the Linux kernel, the following vulnerability has been resolved: drivers: tty: serial: Fix deadlock in sa1100_set_termios() There is a deadlock in sa1100_set_termios(), which is shown below: (Thread 1) | (Thread 2) | sa1100_enable_ms() sa1100_set_termios() | mod_timer() spin_lock_irqsave() //(1) | (wait a time) ... | sa1100_timeout() del_timer_sync() | spin_lock_irqsave() //(2) (wait timer to stop) | ... We hold sport->port.lock in position (1) of thread 1 and use del_timer_sync() to wait timer to stop, but timer handler also need sport->port.lock in position (2) of thread 2. As a result, sa1100_set_termios() will block forever. This patch moves del_timer_sync() before spin_lock_irqsave() in order to prevent the deadlock.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/tty/serial/sa1100.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 0976808d0d171ec837d4bd3e9f4ad4a00ab703b8 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 85e20f8bd31a46d8c60103d0274a8ebe8f47f2b2 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 920f0ae7a129ffee98a106e3bbdfd61a2a59e939 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 09a5958a2452ad22d0cb638711ef34ea1863a829 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 6e2273eefab54a521d9c59efb6e1114e742bdf41 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 2cbfc38df580bff5b2fe19f21c1a7520efcc4b3b (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 553213432ef0c295becdc08c0207d2094468f673 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 34d91e555e5582cffdbcbb75517bc9217866823e (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 62b2caef400c1738b6d22f636c628d9f85cd4c4c (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/tty/serial/sa1100.c
Default Status
affected
Versions
Unaffected
  • From 4.9.318 through 4.9.* (semver)
  • From 4.14.283 through 4.14.* (semver)
  • From 4.19.247 through 4.19.* (semver)
  • From 5.4.198 through 5.4.* (semver)
  • From 5.10.122 through 5.10.* (semver)
  • From 5.15.47 through 5.15.* (semver)
  • From 5.17.15 through 5.17.* (semver)
  • From 5.18.4 through 5.18.* (semver)
  • From 5.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/0976808d0d171ec837d4bd3e9f4ad4a00ab703b8
N/A
https://git.kernel.org/stable/c/85e20f8bd31a46d8c60103d0274a8ebe8f47f2b2
N/A
https://git.kernel.org/stable/c/920f0ae7a129ffee98a106e3bbdfd61a2a59e939
N/A
https://git.kernel.org/stable/c/09a5958a2452ad22d0cb638711ef34ea1863a829
N/A
https://git.kernel.org/stable/c/6e2273eefab54a521d9c59efb6e1114e742bdf41
N/A
https://git.kernel.org/stable/c/2cbfc38df580bff5b2fe19f21c1a7520efcc4b3b
N/A
https://git.kernel.org/stable/c/553213432ef0c295becdc08c0207d2094468f673
N/A
https://git.kernel.org/stable/c/34d91e555e5582cffdbcbb75517bc9217866823e
N/A
https://git.kernel.org/stable/c/62b2caef400c1738b6d22f636c628d9f85cd4c4c
N/A
Hyperlink: https://git.kernel.org/stable/c/0976808d0d171ec837d4bd3e9f4ad4a00ab703b8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/85e20f8bd31a46d8c60103d0274a8ebe8f47f2b2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/920f0ae7a129ffee98a106e3bbdfd61a2a59e939
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/09a5958a2452ad22d0cb638711ef34ea1863a829
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6e2273eefab54a521d9c59efb6e1114e742bdf41
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2cbfc38df580bff5b2fe19f21c1a7520efcc4b3b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/553213432ef0c295becdc08c0207d2094468f673
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/34d91e555e5582cffdbcbb75517bc9217866823e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/62b2caef400c1738b6d22f636c628d9f85cd4c4c
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:26 Feb, 2025 | 07:01
Updated At:14 Apr, 2025 | 20:06

In the Linux kernel, the following vulnerability has been resolved: drivers: tty: serial: Fix deadlock in sa1100_set_termios() There is a deadlock in sa1100_set_termios(), which is shown below: (Thread 1) | (Thread 2) | sa1100_enable_ms() sa1100_set_termios() | mod_timer() spin_lock_irqsave() //(1) | (wait a time) ... | sa1100_timeout() del_timer_sync() | spin_lock_irqsave() //(2) (wait timer to stop) | ... We hold sport->port.lock in position (1) of thread 1 and use del_timer_sync() to wait timer to stop, but timer handler also need sport->port.lock in position (2) of thread 2. As a result, sa1100_set_termios() will block forever. This patch moves del_timer_sync() before spin_lock_irqsave() in order to prevent the deadlock.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 4.9.318(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.10(inclusive) to 4.14.283(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.15(inclusive) to 4.19.247(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.198(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.122(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.47(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 5.17.15(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.18(inclusive) to 5.18.4(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-667Primarynvd@nist.gov
CWE ID: CWE-667
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/0976808d0d171ec837d4bd3e9f4ad4a00ab703b8416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/09a5958a2452ad22d0cb638711ef34ea1863a829416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/2cbfc38df580bff5b2fe19f21c1a7520efcc4b3b416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/34d91e555e5582cffdbcbb75517bc9217866823e416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/553213432ef0c295becdc08c0207d2094468f673416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/62b2caef400c1738b6d22f636c628d9f85cd4c4c416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/6e2273eefab54a521d9c59efb6e1114e742bdf41416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/85e20f8bd31a46d8c60103d0274a8ebe8f47f2b2416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/920f0ae7a129ffee98a106e3bbdfd61a2a59e939416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/0976808d0d171ec837d4bd3e9f4ad4a00ab703b8
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/09a5958a2452ad22d0cb638711ef34ea1863a829
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2cbfc38df580bff5b2fe19f21c1a7520efcc4b3b
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/34d91e555e5582cffdbcbb75517bc9217866823e
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/553213432ef0c295becdc08c0207d2094468f673
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/62b2caef400c1738b6d22f636c628d9f85cd4c4c
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/6e2273eefab54a521d9c59efb6e1114e742bdf41
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/85e20f8bd31a46d8c60103d0274a8ebe8f47f2b2
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/920f0ae7a129ffee98a106e3bbdfd61a2a59e939
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found