CVE-2022-50127

5.5 MEDIUM

📋 TL;DR

This vulnerability in the Linux kernel's RDMA over Converged Ethernet (RoCE) implementation causes a kernel panic (system crash) when error handling occurs during queue pair creation. It affects systems using the rxe driver for RDMA networking. The issue occurs due to uninitialized spinlocks being accessed during cleanup after a failure.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific kernel versions with the vulnerable rxe driver code (check git commits for exact ranges)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if RDMA/rxe driver is loaded and used. Many systems don't use RDMA by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to complete system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System crash when RDMA operations fail during initialization, resulting in service disruption requiring reboot.

🟢

If Mitigated

No impact if the vulnerability is patched or if RDMA/rxe functionality is not used.

🌐 Internet-Facing: LOW - Requires local access or RDMA network access, not typically exposed to internet.
🏢 Internal Only: MEDIUM - Could be exploited by users with RDMA access or through other local vulnerabilities to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger RDMA queue pair creation failures. Likely requires local access or RDMA network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits (1a63f24e724f677db1ab21251f4d0011ae0bb5b5 and related)

Vendor Advisory: https://git.kernel.org/stable/c/1a63f24e724f677db1ab21251f4d0011ae0bb5b5

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version.

🔧 Temporary Workarounds

Disable RDMA/rxe module

linux

Prevent loading of the vulnerable rxe driver module

echo 'blacklist rxe' >> /etc/modprobe.d/blacklist.conf
rmmod rxe

Restrict RDMA access

linux

Limit which users or processes can use RDMA functionality

Use Linux security modules (SELinux/AppArmor) to restrict RDMA access

🧯 If You Can't Patch

  • Disable RDMA functionality if not required
  • Implement strict access controls to limit who can create RDMA queue pairs

🔍 How to Verify

Check if Vulnerable:

Check if rxe module is loaded: lsmod | grep rxe. Check kernel version against affected ranges.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits. Test RDMA functionality to ensure no crashes.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/messages or dmesg
  • RDMA error messages followed by system crash

Network Indicators:

  • Unexpected RDMA connection failures

SIEM Query:

search 'kernel panic' OR 'Oops' OR 'BUG' in system logs with RDMA/rxe context

🔗 References

📤 Share & Export