CVE-2022-49516

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's Intel Ethernet Connection (ice) driver. The vulnerability occurs when the driver fails to check for NULL return values from the ice_get_vf_vsi function, potentially causing kernel crashes or denial of service. This affects systems using Intel Ethernet 800 Series network adapters with SR-IOV virtualization enabled.

💻 Affected Systems

Products:
  • Linux kernel with Intel Ethernet Connection (ice) driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires Intel Ethernet 800 Series adapters with SR-IOV enabled and VF (Virtual Function) usage.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and complete denial of service, potentially requiring physical reboot.

🟠

Likely Case

Kernel oops or system instability when handling VF messages during network adapter resets.

🟢

If Mitigated

Minor performance impact from additional NULL checks with no security impact.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific driver operations.
🏢 Internal Only: MEDIUM - Could be exploited by malicious VMs or users with network configuration privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger specific driver operations during VF VSI transitions, typically requiring local access or VM control.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits baeb705fd6a7245cc1fa69ed991a9cffdf44a174 and e7be3877589d539c52e5d1d23a625f889b541b9d

Vendor Advisory: https://git.kernel.org/stable/c/baeb705fd6a7245cc1fa69ed991a9cffdf44a174

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable SR-IOV

linux

Disable Single Root I/O Virtualization on affected Intel Ethernet adapters

echo 0 > /sys/class/net/<interface>/device/sriov_numvfs

Use alternative network driver

linux

Use different network driver if available for the hardware

modprobe -r ice
modprobe alternative_driver

🧯 If You Can't Patch

  • Restrict access to systems with affected configurations to trusted users only
  • Monitor system logs for kernel oops or crashes related to ice driver

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ice driver is loaded: lsmod | grep ice && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or is newer than vulnerable versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages mentioning ice driver
  • System crashes during network operations
  • dmesg output showing NULL pointer dereference

Network Indicators:

  • Unexpected network interface resets
  • VF connectivity issues

SIEM Query:

source="kernel" AND ("ice" OR "NULL pointer") AND ("dereference" OR "oops" OR "panic")

🔗 References

📤 Share & Export