CVE-2022-48873

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's FastRPC driver. An attacker could exploit this to cause memory corruption, potentially leading to system crashes or arbitrary code execution with kernel privileges. This affects Linux systems using the FastRPC subsystem, particularly those with Qualcomm hardware.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with FastRPC driver before the fix commits
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires FastRPC driver to be enabled/loaded. Common on systems with Qualcomm hardware.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel privilege escalation leading to full system compromise, arbitrary code execution at kernel level, and persistent root access.

🟠

Likely Case

System instability, kernel panics, denial of service, or local privilege escalation to root.

🟢

If Mitigated

Limited to denial of service if exploit fails or system has additional hardening.

🌐 Internet-Facing: LOW - This requires local access to exploit.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of kernel memory layout. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits: 193cd853145b63e670bd73740250983af1475330, 1b7b7bb400dd13dcb03fc6e591bb7ca4664bbec8, 35ddd482345c43d9eec1f3406c0f20a95ed4054b, 4b5c44e924a571d0ad07054de549624fbc04e4d7, 5bb96c8f9268e2fdb0e5321cbc358ee5941efc15

Vendor Advisory: https://git.kernel.org/stable/c/193cd853145b63e670bd73740250983af1475330

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable FastRPC module

linux

Unload or blacklist the FastRPC kernel module if not required

sudo rmmod fastrpc
echo 'blacklist fastrpc' | sudo tee /etc/modprobe.d/fastrpc-blacklist.conf

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernels
  • Implement strict privilege separation and limit user capabilities

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if FastRPC module is loaded: lsmod | grep fastrpc

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and FastRPC module loads without errors in dmesg

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • Segmentation faults in kernel logs
  • FastRPC driver errors in dmesg

Network Indicators:

  • None - local exploit only

SIEM Query:

source="kernel" AND ("fastrpc" OR "use-after-free" OR "general protection fault")

🔗 References

📤 Share & Export