Resource management error in Linux kernel ath ath11k driver



| Updated: 2025-05-11
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-49131
CWE-ID CWE-399
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Resource management error

EUVDB-ID: #VU104878

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49131

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ath11k_ahb_free_ext_irq() function in drivers/net/wireless/ath/ath11k/ahb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.10 - 5.10.110

CPE2.3 External links

https://git.kernel.org/stable/c/22b59cb965f79ee1accf83172441c9ca0ecb632a
https://git.kernel.org/stable/c/38e488db194dc16d2eb23c77c6a8c04ff583c40d
https://git.kernel.org/stable/c/699e8c87e5c406af0f0606f40eeebd248c51b702
https://git.kernel.org/stable/c/c4b7653af62a9a5efe2856183d1f987c5429758b
https://git.kernel.org/stable/c/c6a815f5abdf324108799829dd19ea62fef4bf95
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.111


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###