CVE-2022-50518

7.8 HIGH

📋 TL;DR

This CVE describes a race condition and potential buffer overflow vulnerability in the Linux kernel's parisc architecture firmware interface. It could allow local attackers to cause denial of service or potentially execute arbitrary code. Systems running affected Linux kernel versions on PA-RISC (parisc) architecture are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE description, but patches exist in stable kernel trees.
Operating Systems: Linux distributions running on PA-RISC (HP PA-RISC) architecture
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with PA-RISC architecture. x86, ARM, and other architectures are not affected.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel mode, allowing complete system compromise and arbitrary code execution.

🟠

Likely Case

Kernel panic leading to system crash and denial of service, requiring physical or remote console access to reboot.

🟢

If Mitigated

System remains stable with no impact if the vulnerability is not triggered or proper access controls prevent local user exploitation.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring access to the system, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local users or compromised accounts could exploit this to crash systems or potentially gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of PA-RISC architecture specifics. Race conditions can be challenging to exploit reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits: 04a603058e70b8b881bb7860b8bd649f931f2591, 553bc5890ed96a8d006224c3a4673c47fee0d12a, 7236aae5f81f3efbd93d0601e74fc05994bc2580)

Vendor Advisory: https://git.kernel.org/stable/c/04a603058e70b8b881bb7860b8bd649f931f2591

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Restrict local user access

linux

Limit non-privileged user access to PA-RISC systems to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local users from accessing vulnerable systems
  • Monitor systems for unexpected crashes or kernel panics that could indicate exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check kernel version and architecture: uname -a (look for 'parisc' in output and compare kernel version to patched versions)

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update contains the fix commits or is newer than vulnerable versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System crash/reboot logs
  • Unexpected firmware call failures

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic events or system crash logs on PA-RISC systems

🔗 References

📤 Share & Export