CVE-2022-49925

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem. When the kernel module initialization fails but cleanup is still attempted, it can cause a kernel panic or system crash. This affects systems using RDMA functionality, particularly in virtualization, HPC, and cloud environments.

💻 Affected Systems

Products:
  • Linux kernel with RDMA/Core subsystem
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with RDMA support enabled
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if RDMA/Core subsystem is compiled and loaded. Many distributions don't enable RDMA by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to complete system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System crash when unloading the ib_core module, requiring reboot and causing temporary service interruption.

🟢

If Mitigated

Minor service disruption during module unloading with automatic recovery after reboot.

🌐 Internet-Facing: LOW - Requires local access or ability to load/unload kernel modules.
🏢 Internal Only: MEDIUM - Could be exploited by privileged users or through other vulnerabilities to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires CAP_SYS_MODULE capability to load/unload modules. Could be chained with other vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 07c0d131cc0f, 6b3d5dcb1234, ab817f75e5e0, af8fb5a0600e, d360e875c011

Vendor Advisory: https://git.kernel.org/stable/c/07c0d131cc0fe1f3981a42958fc52d573d303d89

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system. 3. Verify ib_core module loads without errors.

🔧 Temporary Workarounds

Disable RDMA module loading

linux

Prevent loading of vulnerable ib_core module

echo 'blacklist ib_core' >> /etc/modprobe.d/blacklist-rdma.conf
rmmod ib_core

Restrict module loading

linux

Limit who can load kernel modules

sysctl -w kernel.modules_disabled=1
echo 'kernel.modules_disabled=1' >> /etc/sysctl.conf

🧯 If You Can't Patch

  • Restrict module loading capabilities to trusted users only
  • Monitor for attempts to load/unload ib_core module

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ib_core module is loaded: lsmod | grep ib_core

Check Version:

uname -r

Verify Fix Applied:

Check kernel version contains fix commits and attempt to load/unload ib_core module without crash

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • NULL pointer dereference in kernel logs
  • ib_core module load/unload failures

Network Indicators:

  • Sudden loss of RDMA connectivity

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "ib_core" OR "KASAN: null-ptr-deref")

🔗 References

📤 Share & Export