CVE-2022-50084
📋 TL;DR
This CVE describes a memory corruption vulnerability in the Linux kernel's device mapper RAID subsystem. When reading RAID status information, the kernel incorrectly casts memory pointers for certain RAID types, potentially allowing attackers to read kernel memory. This affects Linux systems using device mapper RAID (dm-raid) with RAID types other than 4, 5, or 6.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory disclosure could lead to information leakage, potentially exposing sensitive data or facilitating further exploitation through kernel privilege escalation.
Likely Case
Information disclosure of kernel memory contents, which could reveal internal kernel structures or sensitive data.
If Mitigated
Limited impact with proper access controls, as exploitation requires local access and specific RAID configurations.
🎯 Exploit Status
Exploitation requires local access, specific RAID configurations, and knowledge of kernel memory layout. The vulnerability is primarily an information disclosure issue.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 1ae0ebfb576b72c2ef400917a5484ebe7892d80b or related fixes
Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1ae0ebfb576b72c2ef400917a5484ebe7892d80b
Restart Required: Yes
Instructions:
1. Update Linux kernel to a version containing the fix. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot the system after kernel update.
🔧 Temporary Workarounds
Avoid vulnerable RAID configurations
linuxDo not use device mapper RAID with RAID types other than 4, 5, or 6 until patched.
🧯 If You Can't Patch
- Avoid using device mapper RAID with RAID 0, 1, 10, or multipath configurations
- Implement strict access controls to limit local user access to systems with vulnerable configurations
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if using dm-raid with non-RAID4/5/6 configurations: 'uname -r' and 'dmsetup table'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and check for presence of the fix commit in kernel source: 'uname -r' and check distribution security advisories
📡 Detection & Monitoring
Log Indicators:
- KASAN warnings in kernel logs about slab-out-of-bounds reads in raid_status function
- Kernel oops or crash reports related to dm_raid module
SIEM Query:
Search for kernel logs containing 'KASAN: slab-out-of-bounds' and 'raid_status' or 'dm_raid'
🔗 References
- https://git.kernel.org/stable/c/1ae0ebfb576b72c2ef400917a5484ebe7892d80b
- https://git.kernel.org/stable/c/1fbeea217d8f297fe0e0956a1516d14ba97d0396
- https://git.kernel.org/stable/c/49dba30638e091120256a9e89125340795f034dc
- https://git.kernel.org/stable/c/4c233811a49578634d10a5e70a9dfa569d451e94
- https://git.kernel.org/stable/c/90b006da40dd42285b24dd3c940d2c32aca9a70b
- https://git.kernel.org/stable/c/b4c6c07c92b6cba2bf3cb2dfa722debeaf8a8abe
- https://git.kernel.org/stable/c/b856ce5f4b55f752144baf17e9d5c415072652c5
- https://git.kernel.org/stable/c/cb583ca6125ac64c98e9d65128e95ebb5be7d322
- https://git.kernel.org/stable/c/d8971b595d7adac3421c21f59918241f1574061e