CVE-2022-50441

5.5 MEDIUM

📋 TL;DR

This vulnerability in the Linux kernel's mlx5 network driver allows a NULL pointer dereference when delayed bond work isn't properly cancelled before workqueue destruction. It affects systems using Mellanox network adapters with the mlx5 driver and can cause kernel panics or system crashes. The issue requires local access or ability to trigger network driver operations.

💻 Affected Systems

Products:
  • Linux kernel with mlx5 network driver
Versions: Linux kernel versions containing commit 0d4e8ed139d8 up to versions with fixes (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Mellanox network adapters using the mlx5 driver. Requires specific network configuration operations to trigger.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System crash or kernel panic when network interface configuration changes occur, requiring reboot to restore service.

🟢

If Mitigated

Minor service interruption if systems have redundancy and automatic failover capabilities.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific network driver operations.
🏢 Internal Only: MEDIUM - Internal users with appropriate privileges could trigger the condition through network configuration changes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to perform network interface bonding operations or trigger specific mlx5 driver events. No public exploit code has been observed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 4d1c1379d71777ddeda3e54f8fc26e9ecbfd1009, 5df57bb04e91add52fb67e226209df9a17f06a89, 8f1b8b3133504bf9125ee507ddcc3a8fb41a41f0

Vendor Advisory: https://git.kernel.org/stable/c/4d1c1379d71777ddeda3e54f8fc26e9ecbfd1009

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check distribution-specific security advisories for patched kernel packages. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid network bonding operations

linux

Prevent triggering the vulnerability by avoiding changes to network interface bonding configurations on affected systems.

Disable mlx5 driver if not needed

linux

If Mellanox network adapters are not required, blacklist the mlx5 driver.

echo 'blacklist mlx5_core' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Isolate affected systems from untrusted users who could perform network configuration changes.
  • Implement monitoring for kernel panic events and have rapid recovery procedures ready.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if mlx5 driver is loaded: uname -r && lsmod | grep mlx5

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable range and check for presence of fix commits in kernel source.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • NULL pointer dereference errors mentioning mlx5 or bond work
  • System crash/reboot events

Network Indicators:

  • Sudden loss of network connectivity on affected interfaces

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "mlx5" OR "bond work")

🔗 References

📤 Share & Export