CVE-2022-50452
📋 TL;DR
This is a NULL pointer dereference vulnerability in the Linux kernel's CAKE (Common Applications Kept Enhanced) queuing discipline. When CAKE initialization fails during qdisc setup, subsequent cleanup code attempts to access uninitialized memory, causing a kernel panic. This affects Linux systems using CAKE as the default queuing discipline.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially disrupting network connectivity and system availability.
Likely Case
System crash or kernel panic when configuring network queuing disciplines, requiring reboot to restore functionality.
If Mitigated
No impact if CAKE is not used as the default qdisc or if the vulnerable code path is not triggered.
🎯 Exploit Status
Exploitation requires CAP_NET_ADMIN privileges and specific network configuration conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 154f4c06d9dbec1a14e91286c70b6305810302e0 or later
Vendor Advisory: https://git.kernel.org/stable/c/154f4c06d9dbec1a14e91286c70b6305810302e0
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Reboot system to load new kernel. 3. Verify kernel version with 'uname -r'.
🔧 Temporary Workarounds
Disable CAKE as default qdisc
linuxChange default queuing discipline from CAKE to another qdisc like pfifo_fast
tc qdisc add dev <interface> root pfifo_fast
tc qdisc del dev <interface> root cake
🧯 If You Can't Patch
- Avoid using CAKE as the default queuing discipline
- Restrict CAP_NET_ADMIN capabilities to trusted users only
🔍 How to Verify
Check if Vulnerable:
Check if CAKE is configured as default qdisc and kernel version is vulnerable: 'tc qdisc show | grep cake' and 'uname -r'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched: 'uname -r' should show version with fix commits
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- NULL pointer dereference errors
- CAKE-related crash reports
Network Indicators:
- Sudden loss of network connectivity on affected interfaces
- Qdisc configuration failures
SIEM Query:
kernel: *general protection fault* AND *cake* OR *qdisc* AND *null-ptr-deref*
🔗 References
- https://git.kernel.org/stable/c/154f4c06d9dbec1a14e91286c70b6305810302e0
- https://git.kernel.org/stable/c/1dc0a019550fd38ec6cab2d73c90df2bd659c96b
- https://git.kernel.org/stable/c/51f9a8921ceacd7bf0d3f47fa867a64988ba1dcb
- https://git.kernel.org/stable/c/86aa1390898146f1de277bb6d2a8ed7fc7a43f12
- https://git.kernel.org/stable/c/ae48bee2830bf216800e1447baca39541e27a12e
- https://git.kernel.org/stable/c/bc8301ea7e7f1bb9d2ba2fcdf7b5ec2f0792b47e