CVE-2022-50187
📋 TL;DR
A race condition vulnerability in the Linux kernel's ath11k wireless driver allows a local attacker to trigger a kernel panic (denial of service) by exploiting timing issues during network device initialization. This affects systems using Qualcomm Atheros 802.11ax wireless chipsets with vulnerable kernel versions. The vulnerability requires local access to trigger.
💻 Affected Systems
- Linux kernel with ath11k wireless driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, requiring physical or remote console access to reboot.
Likely Case
System crash when wireless interface is brought up, causing temporary service disruption until reboot.
If Mitigated
No impact if patched or if vulnerable driver not loaded.
🎯 Exploit Status
Exploitation requires precise timing to trigger race condition during device initialization. No known public exploits.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 307ce58270b3b50ca21cfcc910568429b06803f7 and related backports
Vendor Advisory: https://git.kernel.org/stable/c/307ce58270b3b50ca21cfcc910568429b06803f7
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing fix. 2. For distributions: Use package manager (apt/yum/dnf) to install latest kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable ath11k driver
linuxPrevent loading of vulnerable driver if wireless functionality not required
echo 'blacklist ath11k' >> /etc/modprobe.d/blacklist-ath11k.conf
update-initramfs -u
reboot
Delay network interface startup
linuxAdd delay to reduce race condition probability
Add 'sleep 2' in network startup scripts before bringing up wireless interfaces
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable wireless hardware
- Monitor for kernel panic events and implement automatic recovery procedures
🔍 How to Verify
Check if Vulnerable:
Check if ath11k module is loaded: lsmod | grep ath11k AND check kernel version against patched versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commit: grep -r '307ce58270b3b50ca21cfcc910568429b06803f7' /usr/src/linux-headers-*
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages with 'ath11k_mac_op_start' in backtrace
- BUG: Oops messages referencing timer.c:990
- System crash/reboot events
Network Indicators:
- Sudden loss of wireless connectivity followed by system reboot
SIEM Query:
event_type:"kernel" AND message:"ath11k" AND (message:"BUG" OR message:"Oops" OR message:"panic")
🔗 References
- https://git.kernel.org/stable/c/307ce58270b3b50ca21cfcc910568429b06803f7
- https://git.kernel.org/stable/c/a2c45f8c3d18269e641f0c7da2dde47ef8414034
- https://git.kernel.org/stable/c/abb7dc8fbb27c15dcc927df56190f3c5ede58bd5
- https://git.kernel.org/stable/c/d4ba1ff87b17e81686ada8f429300876f55f95ad
- https://git.kernel.org/stable/c/eaff3946a86fc63280a30158a4ae1e141449817c