CVE-2022-50350

4.7 MEDIUM

📋 TL;DR

A race condition in the Linux kernel's iSCSI target subsystem allows a malicious initiator to cause a kernel crash by sending random data during login negotiation. This affects systems running vulnerable Linux kernel versions with iSCSI target functionality enabled. The vulnerability leads to a NULL pointer dereference and system crash.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected kernel versions not explicitly stated in CVE, but patches available in stable kernel trees (see references).
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if iSCSI target module (iscsi_target_mod) is loaded and in use. Not all Linux systems have this enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially disrupting storage services and causing data unavailability.

🟠

Likely Case

System crash requiring reboot, causing temporary service disruption for iSCSI storage services.

🟢

If Mitigated

No impact if patched or if iSCSI target functionality is disabled.

🌐 Internet-Facing: MEDIUM - Requires iSCSI target exposure to untrusted networks, which is uncommon but possible in cloud/storage environments.
🏢 Internal Only: LOW - Typically iSCSI targets are internal storage infrastructure with trusted initiators.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to initiate iSCSI connections to target and send malformed packets during login phase. Timing-dependent race condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits: 1533b8b3058db618409f41554ebe768c2e3acfae, 3ecdca49ca49d4770639d81503c873b6d25887c4, fec1b2fa62c162d03f5dcd7b03e3c89d3116d49f)

Vendor Advisory: https://git.kernel.org/stable/c/1533b8b3058db618409f41554ebe768c2e3acfae

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify iSCSI target module loads correctly after reboot.

🔧 Temporary Workarounds

Disable iSCSI target module

Linux

Prevent loading of vulnerable iSCSI target kernel module

echo 'blacklist iscsi_target_mod' >> /etc/modprobe.d/blacklist.conf
rmmod iscsi_target_mod

Restrict iSCSI network access

Linux

Limit iSCSI target exposure to trusted networks only

iptables -A INPUT -p tcp --dport 3260 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 3260 -j DROP

🧯 If You Can't Patch

  • Disable iSCSI target functionality if not required
  • Implement strict network segmentation for iSCSI traffic
  • Monitor for connection attempts from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check if iSCSI target module is loaded: lsmod | grep iscsi_target_mod

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions from your distribution vendor

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • NULL pointer dereference errors in kernel logs
  • iscsi_target_mod crash reports

Network Indicators:

  • Multiple rapid iSCSI login attempts from single source
  • Malformed iSCSI packets during login phase

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "iscsi_target" OR "login_work")

🔗 References

📤 Share & Export