CVE-2022-50135

5.5 MEDIUM

📋 TL;DR

This CVE describes a null pointer dereference vulnerability in the Linux kernel's RDMA over Converged Ethernet (RoCE) implementation. When error handling occurs during queue pair creation, the system can crash due to accessing null pointers, potentially causing denial of service. Systems using RDMA functionality with the rxe driver are affected.

💻 Affected Systems

Products:
  • Linux kernel with RDMA rxe driver enabled
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if RDMA functionality is enabled and the rxe driver is being used. Most default configurations don't enable RDMA.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and complete denial of service, requiring physical or remote reboot.

🟠

Likely Case

System crash or kernel panic when RDMA operations fail during queue pair initialization, causing temporary service disruption.

🟢

If Mitigated

Minimal impact if RDMA is not used or if error conditions don't trigger the specific code path.

🌐 Internet-Facing: LOW - Requires local access or RDMA network access, not typically exposed to internet.
🏢 Internal Only: MEDIUM - Internal systems using RDMA for high-performance computing or storage could experience crashes affecting critical services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to trigger RDMA queue pair creation with specific error conditions. Likely requires local access or RDMA network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 37da51efe6eaa0560f46803c8c436a48a2084da7 and 8598b9d0a364c1663c96fc0fab9df0d36c809aea

Vendor Advisory: https://git.kernel.org/stable/c/37da51efe6eaa0560f46803c8c436a48a2084da7

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable RDMA rxe driver

linux

Prevent loading of the vulnerable RDMA rxe driver module

echo 'blacklist rdma_rxe' >> /etc/modprobe.d/blacklist-rdma.conf
rmmod rdma_rxe

Disable RDMA functionality

linux

Completely disable RDMA if not required

modprobe -r rdma_rxe
systemctl disable rdma.service
echo 'install rdma_rxe /bin/false' >> /etc/modprobe.d/disable-rdma.conf

🧯 If You Can't Patch

  • Disable RDMA functionality if not required for operations
  • Implement strict access controls to prevent unauthorized users from triggering RDMA operations

🔍 How to Verify

Check if Vulnerable:

Check if RDMA rxe driver is loaded: lsmod | grep rdma_rxe. Check kernel version against distribution security advisories.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check with distribution package manager that security update is installed.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/messages or journalctl
  • BUG: KASAN: null-ptr-deref errors
  • RDMA/rxe related crash dumps

Network Indicators:

  • Unexpected RDMA connection failures
  • Abnormal RDMA traffic patterns

SIEM Query:

source="kernel" AND ("null-ptr-deref" OR "KASAN" OR "rxe_qp_do_cleanup")

🔗 References

📤 Share & Export