CVE-2022-49083
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's OMAP IOMMU driver allows local attackers to cause a kernel panic (denial of service). This affects Linux systems using OMAP IOMMU hardware, primarily ARM-based devices like embedded systems and IoT devices.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially requiring physical reboot.
Likely Case
System crash when IOMMU device probing occurs during boot or device initialization.
If Mitigated
No impact if system doesn't use OMAP IOMMU or vulnerability is patched.
🎯 Exploit Status
Triggering requires local access and specific hardware configuration. No known public exploits.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in stable kernel branches via commits: 1d89f2b9eadb, 47e239117bd9, 71ff461c3f41, bd905fed87ce, ea518578aa8a
Vendor Advisory: https://git.kernel.org/stable/c/1d89f2b9eadbcf3ce93c6d7238f68299a1f84968
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. For embedded systems: Rebuild kernel with patches from stable tree. 3. Reboot system after update.
🔧 Temporary Workarounds
Disable OMAP IOMMU
linuxIf not needed, disable OMAP IOMMU support in kernel configuration
Rebuild kernel with CONFIG_OMAP_IOMMU=n
🧯 If You Can't Patch
- Restrict local access to affected systems
- Monitor for kernel panic events and system crashes
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if OMAP IOMMU is enabled: 'uname -r' and check kernel config for CONFIG_OMAP_IOMMU
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated beyond patched commits and system boots without IOMMU-related crashes
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NULL pointer dereference in dmesg
- IOMMU probe failure logs
Network Indicators:
- None - local vulnerability
SIEM Query:
Search for: 'kernel panic', 'NULL pointer dereference', 'omap_iommu' in system logs
🔗 References
- https://git.kernel.org/stable/c/1d89f2b9eadbcf3ce93c6d7238f68299a1f84968
- https://git.kernel.org/stable/c/47e239117bd97c8556f9187af7a9a7938db4e021
- https://git.kernel.org/stable/c/71ff461c3f41f6465434b9e980c01782763e7ad8
- https://git.kernel.org/stable/c/bd905fed87ce01ac010011bb8f44ed0140116ceb
- https://git.kernel.org/stable/c/ea518578aa8a9a0280605b53cc33f707e10c8178