CVE-2022-50044

4.7 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's Qualcomm QRTR networking subsystem allows kernel panics or service enumeration failures when MHI channels generate events before endpoint creation completes. This affects Linux systems using Qualcomm-based hardware with QRTR networking enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when QRTR networking subsystem is enabled and using MHI channels, typically on Qualcomm-based hardware

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service

🟠

Likely Case

QRTR service enumeration failures preventing proper network communication

🟢

If Mitigated

Minor service disruption if QRTR networking is not critical for system operation

🌐 Internet-Facing: LOW - Requires local access or specific hardware configuration
🏢 Internal Only: MEDIUM - Can affect embedded systems and devices using Qualcomm hardware

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires specific hardware configuration and timing conditions to trigger

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 68a838b84effb7b57ba7d50b1863fc6ae35a54ce, a1a75f78a2937567946b1b756f82462874b5ca20, or c682fb70a7dfc25b848a4ff3a385b0471b470606

Vendor Advisory: https://git.kernel.org/stable/c/68a838b84effb7b57ba7d50b1863fc6ae35a54ce

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable QRTR networking

linux

Disable the QRTR networking subsystem if not required

modprobe -r qrtr
echo 'blacklist qrtr' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Ensure QRTR networking is disabled if not required
  • Monitor system logs for kernel panic events related to QRTR

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if QRTR module is loaded: lsmod | grep qrtr

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and test QRTR functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • QRTR-related error messages in dmesg
  • Service enumeration failures

Network Indicators:

  • QRTR service discovery failures

SIEM Query:

search 'kernel panic' OR 'qrtr' OR 'MHI channel' in system logs

🔗 References

📤 Share & Export