CVE-2022-50211

7.1 HIGH

📋 TL;DR

This is a kernel memory corruption vulnerability in the Linux md-raid10 subsystem where improper bounds checking allows reading beyond allocated memory boundaries. It affects Linux systems using RAID10 configurations via the md driver. The vulnerability can lead to system instability or crashes.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only affects systems using RAID10 via the md driver. Requires RAID10 configuration to be vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, potential denial of service, or information disclosure through memory leaks.

🟠

Likely Case

System instability or crash when performing RAID10 operations, particularly during disk removal or reshape operations.

🟢

If Mitigated

Minor performance impact or failed RAID operations without system compromise.

🌐 Internet-Facing: LOW - Requires local access to trigger via RAID operations.
🏢 Internal Only: MEDIUM - Local users or processes with RAID management privileges can trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to perform RAID operations. Triggered during specific RAID10 operations like disk removal.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 0f4d18cbea4a6e37a05fd8ee2887439f85211110 or later

Vendor Advisory: https://git.kernel.org/stable/c/0f4d18cbea4a6e37a05fd8ee2887439f85211110

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. For RHEL/CentOS: yum update kernel. 3. For Ubuntu/Debian: apt update && apt upgrade linux-image. 4. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid RAID10 operations

linux

Temporarily avoid RAID10 reshape or disk removal operations until patched.

# Monitor RAID operations and avoid: mdadm --grow --raid-devices, mdadm --remove

🧯 If You Can't Patch

  • Restrict access to RAID management tools to trusted administrators only
  • Monitor system logs for RAID-related errors or crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if RAID10 is in use: cat /proc/mdstat and uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and no KASAN warnings appear in dmesg during RAID operations

📡 Detection & Monitoring

Log Indicators:

  • KASAN warnings in kernel logs
  • 'slab-out-of-bounds' errors
  • RAID10 operation failures

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("KASAN" OR "slab-out-of-bounds" OR "raid10_remove_disk")

🔗 References

📤 Share & Export