CVE-2022-50003

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's Intel ice driver when using XDP sockets (XSK) with unbalanced queue configurations. Attackers could cause a kernel panic and denial of service by attaching XSK sockets to queue IDs that don't have corresponding Rx queues. Systems using Intel Ethernet 800 Series network adapters with specific queue configurations are affected.

💻 Affected Systems

Products:
  • Linux kernel with Intel ice driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using XDP sockets (XSK) with specific unbalanced queue configurations (ethtool -L with mismatched Rx/Tx queue counts followed by xdpsock with -q parameter outside combined queue range).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical access to restore functionality.

🟠

Likely Case

System crash or instability when XSK sockets are configured with specific queue parameters, resulting in temporary service disruption.

🟢

If Mitigated

No impact if XSK is not used or queue configurations follow combined queue guidelines.

🌐 Internet-Facing: LOW - Requires local access or ability to execute privileged commands on the system.
🏢 Internal Only: MEDIUM - Malicious local users or misconfigured applications could trigger the vulnerability on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to configure network queues and XSK sockets. The vulnerability was discovered during code review and fixed before widespread exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel commits: 03a3f29fe5b1, 1bfdcde723d8, 5a42f112d367, fe76b3e67466

Vendor Advisory: https://git.kernel.org/stable/c/03a3f29fe5b1751ad9b5c892c894183e75a6e4c4

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid unbalanced queue configurations

linux

Prevent using XSK sockets with queue IDs outside combined queue range

# Ensure queue configurations use balanced Rx/Tx counts
# Avoid: ethtool -L $IFACE rx 8 tx 96
# Use: ethtool -L $IFACE combined 8

Disable XDP sockets

linux

Prevent XSK usage if not required

# Remove XDP programs if loaded
ip link set dev $IFACE xdp off

🧯 If You Can't Patch

  • Restrict local user access to prevent queue configuration changes
  • Implement strict change control for network interface configurations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ice driver is loaded: uname -r && lsmod | grep ice

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or is newer than vulnerable versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages with 'ice_xsk_pool_setup' in call trace
  • NULL pointer dereference errors in kernel logs
  • System crash/reboot events

Network Indicators:

  • Sudden loss of network connectivity on affected interfaces

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "ice_xsk_pool_setup" OR "Oops: 0000")

🔗 References

📤 Share & Export