CVE-2022-50342

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's floppy driver initialization function. When floppy disk allocation fails during module loading, kernel memory allocated for block queue tags is not properly freed, leading to resource exhaustion over time. This affects systems with the floppy driver loaded, though floppy drives are rarely used in modern systems.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches are available in stable kernel trees
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if floppy driver module is loaded (rare on modern systems) and fails during initialization. Most systems don't load floppy drivers by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Repeated exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential kernel panic if memory allocation fails for critical operations.

🟠

Likely Case

Minor memory leak that accumulates slowly, potentially causing performance degradation over extended periods if the floppy module is repeatedly loaded/unloaded.

🟢

If Mitigated

Minimal impact since floppy drivers are rarely loaded on modern systems, and the leak only occurs during initialization failure scenarios.

🌐 Internet-Facing: LOW - This vulnerability requires local access to load kernel modules and is not remotely exploitable.
🏢 Internal Only: LOW - Even with local access, exploitation requires specific conditions (floppy module loading failure) and provides limited impact beyond potential memory exhaustion.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access, ability to load kernel modules, and specific conditions where floppy driver initialization fails. Memory leak is slow and not directly controllable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in stable kernel versions via commits referenced in CVE

Vendor Advisory: https://git.kernel.org/stable/c/55b3c66a0d441cd37154ae95e44d0b82ccfd580e

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify floppy module is not loaded unless needed.

🔧 Temporary Workarounds

Disable floppy module loading

all

Prevent floppy driver from being loaded to eliminate vulnerability surface

echo 'blacklist floppy' | sudo tee /etc/modprobe.d/blacklist-floppy.conf
sudo rmmod floppy 2>/dev/null || true

🧯 If You Can't Patch

  • Ensure floppy module is not loaded (check with 'lsmod | grep floppy')
  • Restrict module loading permissions to prevent unauthorized users from loading floppy driver

🔍 How to Verify

Check if Vulnerable:

Check if floppy module is loaded: 'lsmod | grep -i floppy'. If loaded, check kernel version against patched releases.

Check Version:

uname -r

Verify Fix Applied:

After patching, verify floppy module can be loaded/unloaded without memory leak using kernel memory monitoring tools.

📡 Detection & Monitoring

Log Indicators:

  • Kernel messages about memory allocation failures
  • System logs showing floppy module loading/unloading

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Process monitoring for 'modprobe floppy' or kernel module loading events

🔗 References

📤 Share & Export