CVE-2025-22119

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's cfg80211 WiFi subsystem where wiphy_work_lock is accessed before proper initialization when rfkill allocation fails. This can cause kernel lockdep warnings or potential crashes during WiFi device initialization. Affects Linux systems using the cfg80211 WiFi subsystem.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the cfg80211 WiFi subsystem. Requires WiFi hardware/drivers to be present and used.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash during WiFi device initialization, leading to denial of service.

🟠

Likely Case

Kernel lockdep warnings and potential system instability during WiFi operations, particularly when creating/destroying WiFi interfaces.

🟢

If Mitigated

Minor performance impact from lockdep validation being disabled, but system remains functional.

🌐 Internet-Facing: LOW - Requires local access to trigger the race condition during WiFi device operations.
🏢 Internal Only: MEDIUM - Could be triggered by privileged users or processes managing WiFi interfaces on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires precise timing during WiFi device initialization failure

Discovered via syzkaller fuzzing. Exploitation requires triggering rfkill allocation failure during WiFi device setup.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel stable commits: 2617f60c3613, 60606efbf525, 7e6040853f5b, b679fe84cd5c, eeacfbab9842

Vendor Advisory: https://git.kernel.org/stable/c/2617f60c3613ef105b8db2d514d2cac2a1836f7d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable vulnerable WiFi drivers

linux

Prevent loading of cfg80211-based WiFi drivers to avoid triggering the vulnerability

echo 'blacklist cfg80211' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u

🧯 If You Can't Patch

  • Restrict access to WiFi configuration tools to privileged users only
  • Monitor system logs for lockdep warnings related to cfg80211_dev_free

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if it contains the fix commits. Run: uname -r and compare with distribution security advisories.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check dmesg for absence of lockdep warnings related to cfg80211_dev_free

📡 Detection & Monitoring

Log Indicators:

  • Kernel lockdep warnings mentioning cfg80211_dev_free
  • Messages about uninitialized wiphy_work_lock
  • WiFi initialization failures

Network Indicators:

  • Unusual WiFi interface creation/destruction patterns

SIEM Query:

source="kernel" AND ("cfg80211_dev_free" OR "wiphy_work_lock" OR "lockdep")

🔗 References

📤 Share & Export