CVE-2022-50343

5.5 MEDIUM

📋 TL;DR

This vulnerability is a memory leak in the Linux kernel's RapidIO subsystem that occurs when device addition fails. It allows attackers to cause resource exhaustion over time, potentially leading to denial of service. Systems using RapidIO hardware with affected Linux kernel versions are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions containing the vulnerable RapidIO code before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with RapidIO hardware support enabled in kernel configuration and using RapidIO devices.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could exhaust kernel memory, causing system instability, crashes, or denial of service requiring reboot.

🟠

Likely Case

Gradual memory consumption leading to performance degradation over time, particularly on systems with frequent RapidIO device operations.

🟢

If Mitigated

Minimal impact with proper monitoring and memory limits in place, though some resource waste may still occur.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger RapidIO device operations, which are typically internal hardware interfaces.
🏢 Internal Only: MEDIUM - Systems with RapidIO hardware could be affected by local attackers or through other vulnerabilities that trigger the memory leak.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger RapidIO device addition failures, typically requiring local access or control of RapidIO hardware.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 3b4676f274a6b5d001176f15d0542100bbf4b59a and related fixes

Vendor Advisory: https://git.kernel.org/stable/c/3b4676f274a6b5d001176f15d0542100bbf4b59a

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. For custom kernels: Apply patches from kernel.org and rebuild.

🔧 Temporary Workarounds

Disable RapidIO support

all

Remove RapidIO kernel module support if not needed

modprobe -r rapidio
echo 'blacklist rapidio' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Monitor kernel memory usage for unusual growth patterns
  • Implement process and memory limits to contain potential resource exhaustion

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if RapidIO module is loaded: lsmod | grep rapidio

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check with distribution's security advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • Memory allocation failures in dmesg
  • RapidIO error messages

Network Indicators:

  • None - this is a local memory management issue

SIEM Query:

Search for kernel logs containing 'rapidio' errors or memory allocation failures

🔗 References

📤 Share & Export