CVE-2022-49106

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's vchiq_arm driver. If exploited, it could cause a kernel panic leading to denial of service. Systems running affected Linux kernel versions with the vchiq_arm driver loaded are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches were applied to stable kernel trees. Likely affects versions before the fix commits.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the vchiq_arm driver (VideoCore Host Interface for ARM) is loaded. This driver is typically used on Raspberry Pi and other ARM-based systems with Broadcom VideoCore GPUs.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical access to reboot the system.

🟠

Likely Case

Local denial of service through kernel panic, requiring system reboot to restore functionality.

🟢

If Mitigated

No impact if the vchiq_arm driver is not loaded or the system is patched.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system.
🏢 Internal Only: MEDIUM - Local users or processes could trigger the vulnerability to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to trigger the vulnerable code path. The vulnerability is in a staging driver, which may limit exposure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits: 176df12b38c70b0a45e6392a0ee5bc83489dfc29, 4627250cabaa80278d3ab01ad107893cea83799f, 51e5e5c34c22c0bfec0808d8c33e0b2fcf4c7c89, aa899e686d442c63d50f4d369cc02dbbf0941cb0

Vendor Advisory: https://git.kernel.org/stable/c/176df12b38c70b0a45e6392a0ee5bc83489dfc29

Restart Required: Yes

Instructions:

1. Update Linux kernel to a version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Unload vchiq_arm driver

linux

Remove the vulnerable driver module if not needed

sudo rmmod vchiq_arm

Blacklist vchiq_arm driver

linux

Prevent driver from loading at boot

echo 'blacklist vchiq_arm' | sudo tee /etc/modprobe.d/blacklist-vchiq.conf

🧯 If You Can't Patch

  • Restrict local user access to systems using vchiq_arm driver
  • Implement monitoring for kernel panic events and system crashes

🔍 How to Verify

Check if Vulnerable:

Check if vchiq_arm driver is loaded: lsmod | grep vchiq_arm

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions and verify vchiq_arm driver is either not loaded or system is patched

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • System crash/reboot events

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kern.log" AND "kernel panic" OR "Oops" OR "NULL pointer dereference"

🔗 References

📤 Share & Export