CVE-2022-50066

7.8 HIGH

📋 TL;DR

This CVE describes an array index out-of-bounds vulnerability in the Linux kernel's Atlantic network driver. The vulnerability allows an attacker to cause a kernel panic or potentially execute arbitrary code by triggering an out-of-bounds memory access. Systems using affected Linux kernel versions with the Atlantic network driver are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions containing the vulnerable Atlantic network driver code prior to fixes in stable releases
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the Atlantic network driver (drivers/net/ethernet/aquantia/atlantic). Systems without this driver or with it disabled are not vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential arbitrary code execution with kernel privileges resulting in complete system compromise.

🟠

Likely Case

System crash or kernel panic causing denial of service, requiring physical or remote console access to reboot.

🟢

If Mitigated

System remains stable with proper patching; unpatched systems may experience crashes under specific network driver operations.

🌐 Internet-Facing: LOW - Requires local access or specific network driver operations to trigger.
🏢 Internal Only: MEDIUM - Internal attackers with local access could trigger the vulnerability to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific network driver operations, likely requiring local access or ability to manipulate network interfaces.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel stable releases containing commits: 23bf155476539354ab5c8cc9bb460fd1209b39b5, 2ba5e47fb75fbb8fab45f5c1bc8d5c33d8834bd3, 422a02a771599cac96f2b2900d993e0bb7ba5b88, df60c534d4c5a681172952dd4b475a5d818b3a86

Vendor Advisory: https://git.kernel.org/stable/c/23bf155476539354ab5c8cc9bb460fd1209b39b5

Restart Required: Yes

Instructions:

1. Update Linux kernel to a patched version from your distribution's repositories. 2. Reboot the system to load the new kernel. 3. Verify the Atlantic driver version includes the fix.

🔧 Temporary Workarounds

Disable Atlantic network driver

linux

Prevent loading of the vulnerable Atlantic network driver module

echo 'blacklist atlantic' >> /etc/modprobe.d/blacklist-atlantic.conf
rmmod atlantic

🧯 If You Can't Patch

  • Disable or remove Atlantic network hardware if not required
  • Implement strict access controls to prevent unauthorized users from triggering network driver operations

🔍 How to Verify

Check if Vulnerable:

Check if Atlantic driver is loaded: lsmod | grep atlantic. Check kernel version and if it contains vulnerable code.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check dmesg logs for absence of array-index-out-of-bounds errors related to aq_nic.c

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing 'UBSAN: array-index-out-of-bounds in drivers/net/ethernet/aquantia/atlantic/aq_nic.c'
  • System crash or kernel panic events

Network Indicators:

  • Unusual network interface errors or resets on systems with Atlantic hardware

SIEM Query:

event_source:kernel AND (message:"array-index-out-of-bounds" OR message:"aq_nic.c" OR message:"atlantic")

🔗 References

📤 Share & Export