CVE-2022-50187

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50187
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50187.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50187
Related
Published
2025-06-18T11:15:49Z
Modified
2025-06-18T16:49:03.923565Z
Downstream
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ath11k: fix netdev open race

Make sure to allocate resources needed before registering the device.

This specifically avoids having a racing open() trigger a BUGON() in modtimer() when ath11kmacopstart() is called before the monreap_timer as been set up.

I did not see this issue with next-20220310, but I hit it on every probe with next-20220511. Perhaps some timing changed in between.

Here's the backtrace:

[ 51.346947] kernel BUG at kernel/time/timer.c:990! [ 51.346958] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ... [ 51.578225] Call trace: [ 51.583293] modtimer+0x298/0x390 [ 51.589518] modtimer+0x14/0x20 [ 51.595368] ath11kmacopstart+0x41c/0x4a0 [ath11k] [ 51.603165] drvstart+0x38/0x60 [mac80211] [ 51.610110] ieee80211doopen+0x29c/0x7d0 [mac80211] [ 51.617945] ieee80211open+0x60/0xb0 [mac80211] [ 51.625311] _devopen+0x100/0x1c0 [ 51.631420] _devchangeflags+0x194/0x210 [ 51.638214] devchangeflags+0x24/0x70 [ 51.644646] dosetlink+0x228/0xdb0 [ 51.650723] _rtnlnewlink+0x460/0x830 [ 51.657162] rtnlnewlink+0x4c/0x80 [ 51.663229] rtnetlinkrcvmsg+0x124/0x390 [ 51.669917] netlinkrcvskb+0x58/0x130 [ 51.676314] rtnetlinkrcv+0x18/0x30 [ 51.682460] netlinkunicast+0x250/0x310 [ 51.688960] netlinksendmsg+0x19c/0x3e0 [ 51.695458] _syssendmsg+0x220/0x290 [ 51.701938] _syssendmsg+0x7c/0xc0 [ 51.708148] _syssendmsg+0x68/0xd0 [ 51.714254] _arm64syssendmsg+0x28/0x40 [ 51.720900] invokesyscall+0x48/0x120

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPLV1V2SILICONZLITE-3

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.140-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}