CVE-2022-49073

7.8 HIGH

📋 TL;DR

This vulnerability is an out-of-bounds write in the Linux kernel's sata_dwc_460ex driver that can cause kernel crashes or potential privilege escalation. It affects Linux systems using the affected SATA driver, particularly on PowerPC 44x platforms. The issue occurs when the driver incorrectly handles internal ATA tags, leading to memory corruption.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution, but generally before kernel 5.4.163 with backports)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily affects systems with PowerPC 44x architecture using the sata_dwc_460ex driver, but the vulnerability exists in the driver code for all architectures.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, potential privilege escalation to kernel mode, or arbitrary code execution in kernel context.

🟠

Likely Case

System instability, kernel crashes, denial of service affecting SATA operations, particularly during disk operations.

🟢

If Mitigated

Limited to denial of service on affected systems if proper access controls prevent unprivileged users from triggering the vulnerability.

🌐 Internet-Facing: LOW - This is a kernel-level driver vulnerability requiring local access or ability to trigger SATA operations.
🏢 Internal Only: MEDIUM - Local users or processes with access to SATA operations could trigger crashes or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific SATA operations through the affected driver. The crash reports indicate it can be triggered during normal SCSI error handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 234c0132f76f0676d175757f61b0025191a3d935, 3a8751c0d4e24129e72dcec0139e99833b13904a, 55e1465ba79562a191708a40eeae3f8082a209e3, 596c7efd69aae94f4b0e91172b075eb197958b99, 7aa8104a554713b685db729e66511b93d989dd6a

Vendor Advisory: https://git.kernel.org/stable/c/234c0132f76f0676d175757f61b0025191a3d935

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: apply security updates from your vendor. 3. Rebuild and install kernel if compiling from source. 4. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable affected SATA driver

Linux

Blacklist or disable the sata_dwc_460ex kernel module if not needed

echo 'blacklist sata_dwc_460ex' >> /etc/modprobe.d/blacklist.conf
rmmod sata_dwc_460ex

🧯 If You Can't Patch

  • Restrict access to system to prevent unprivileged users from triggering SATA operations
  • Monitor system logs for kernel crashes related to SATA operations and investigate promptly

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if sata_dwc_460ex module is loaded: 'uname -r' and 'lsmod | grep sata_dwc_460ex'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and check dmesg for absence of sata_dwc_460ex related crashes

📡 Detection & Monitoring

Log Indicators:

  • Kernel NULL pointer dereference messages
  • Oops messages mentioning sata_dwc_460ex
  • Kernel panic logs during SATA operations

Network Indicators:

  • None - this is a local driver vulnerability

SIEM Query:

kernel: "BUG: Kernel NULL pointer dereference" AND "sata_dwc" OR kernel: "Oops" AND "sata_dwc_460ex"

🔗 References

📤 Share & Export