CVE-2022-50361

5.5 MEDIUM

📋 TL;DR

This CVE is a NULL pointer dereference vulnerability in the Linux kernel's wilc1000 WiFi driver. When the driver fails to allocate a workqueue during initialization, it doesn't properly clean up network device registration, leading to a kernel panic. This affects Linux systems using the wilc1000 driver for WiFi connectivity.

💻 Affected Systems

Products:
  • Linux kernel with wilc1000 WiFi driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when using wilc1000 WiFi hardware and when driver initialization fails due to memory allocation issues.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, requiring physical or remote reboot to restore functionality.

🟠

Likely Case

System crash during WiFi driver initialization, preventing network connectivity until system restart.

🟢

If Mitigated

No impact if the driver initialization succeeds normally, which is the common case.

🌐 Internet-Facing: LOW - Requires local system access or specific driver initialization failure conditions.
🏢 Internal Only: MEDIUM - Could affect internal systems during driver initialization or updates.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific error conditions during driver initialization, typically through fault injection or memory pressure scenarios.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 2b88974ecb35, 6da6ce086221, a1bdecedc7ad

Vendor Advisory: https://git.kernel.org/stable/c/2b88974ecb358990e1c33fabcd0b9e142bab7f21

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Rebuild kernel if using custom kernel with affected code.

🔧 Temporary Workarounds

Disable wilc1000 driver

all

Prevent loading of vulnerable driver module

echo 'blacklist wilc1000' >> /etc/modprobe.d/blacklist.conf
rmmod wilc1000

Avoid memory pressure during boot

all

Reduce chance of allocation failure during driver initialization

Ensure adequate system memory available during boot

🧯 If You Can't Patch

  • Avoid using systems with wilc1000 WiFi hardware
  • Monitor system logs for kernel panic events related to wilc1000 driver

🔍 How to Verify

Check if Vulnerable:

Check if wilc1000 module is loaded: lsmod | grep wilc1000 AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: grep -r 'wilc_netdev_ifc_init' /proc/kallsyms for proper error handling symbols

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning wilc1000
  • BUG at net/core/dev.c:10731 in system logs
  • Driver initialization failure logs

Network Indicators:

  • Sudden loss of WiFi connectivity on affected systems

SIEM Query:

source="kernel" AND ("wilc1000" OR "BUG at net/core/dev.c:10731")

🔗 References

📤 Share & Export