CVE-2022-50084

7.1 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in the Linux kernel's device mapper RAID subsystem. When reading RAID status information, the kernel incorrectly casts memory pointers for certain RAID types, potentially allowing attackers to read kernel memory. This affects Linux systems using device mapper RAID (dm-raid) with RAID types other than 4, 5, or 6.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using device mapper RAID (dm-raid) with RAID types other than 4, 5, or 6. Systems not using dm-raid or using only RAID 4/5/6 are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure could lead to information leakage, potentially exposing sensitive data or facilitating further exploitation through kernel privilege escalation.

🟠

Likely Case

Information disclosure of kernel memory contents, which could reveal internal kernel structures or sensitive data.

🟢

If Mitigated

Limited impact with proper access controls, as exploitation requires local access and specific RAID configurations.

🌐 Internet-Facing: LOW - Requires local access to the system and specific RAID configurations.
🏢 Internal Only: MEDIUM - Local attackers could potentially exploit this to gain information about kernel memory, but requires specific RAID configurations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access, specific RAID configurations, and knowledge of kernel memory layout. The vulnerability is primarily an information disclosure issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 1ae0ebfb576b72c2ef400917a5484ebe7892d80b or related fixes

Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1ae0ebfb576b72c2ef400917a5484ebe7892d80b

Restart Required: Yes

Instructions:

1. Update Linux kernel to a version containing the fix. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Avoid vulnerable RAID configurations

linux

Do not use device mapper RAID with RAID types other than 4, 5, or 6 until patched.

🧯 If You Can't Patch

  • Avoid using device mapper RAID with RAID 0, 1, 10, or multipath configurations
  • Implement strict access controls to limit local user access to systems with vulnerable configurations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if using dm-raid with non-RAID4/5/6 configurations: 'uname -r' and 'dmsetup table'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and check for presence of the fix commit in kernel source: 'uname -r' and check distribution security advisories

📡 Detection & Monitoring

Log Indicators:

  • KASAN warnings in kernel logs about slab-out-of-bounds reads in raid_status function
  • Kernel oops or crash reports related to dm_raid module

SIEM Query:

Search for kernel logs containing 'KASAN: slab-out-of-bounds' and 'raid_status' or 'dm_raid'

🔗 References

📤 Share & Export