CVE-2022-49074

5.5 MEDIUM

📋 TL;DR

This CVE describes a bug in the Linux kernel's GICv3 interrupt controller driver where incorrect polling of the GICR_CTLR.RWP bit could cause system instability. The vulnerability affects systems using ARM processors with GICv3 interrupt controllers running vulnerable Linux kernel versions. This is a local vulnerability requiring access to the system.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions with GICv3 support from introduction until fix (approximately 8 years of affected versions)
Operating Systems: Linux distributions running on ARM systems with GICv3 interrupt controllers
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects ARM systems using GICv3 interrupt controllers. x86 systems are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System crash, kernel panic, or denial of service leading to complete system unavailability.

🟠

Likely Case

System instability, intermittent crashes, or performance degradation during interrupt handling operations.

🟢

If Mitigated

Minimal impact with proper access controls preventing unauthorized local access.

🌐 Internet-Facing: LOW - Requires local system access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or compromised accounts with local access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of interrupt controller operations. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel stable releases via the provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/0df6664531a12cdd8fc873f0cac0dcb40243d3e9

Restart Required: Yes

Instructions:

1. Update Linux kernel to a version containing the fix. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version.

🔧 Temporary Workarounds

Restrict local access

linux

Limit local system access to trusted users only to reduce attack surface

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access
  • Monitor system logs for instability or crash events related to interrupt handling

🔍 How to Verify

Check if Vulnerable:

Check if running an affected Linux kernel version on ARM hardware with GICv3: uname -r and check kernel version against patched releases

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes one of the fix commits: git log --oneline | grep -E '0df6664531a1|3c07cc242baf|60e1eb4811f5|6fef3e3179e6|7218a789abb3'

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System crash dumps
  • Interrupt controller error messages in dmesg

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic or system crash events in system logs

🔗 References

📤 Share & Export