CVE-2022-49134

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's mlxsw driver could cause kernel panics or system crashes when processing certain firmware events for the CPU port. This affects systems using Mellanox Spectrum switches with vulnerable kernel versions. The vulnerability requires local access or ability to trigger specific firmware events.

💻 Affected Systems

Products:
  • Linux kernel with mlxsw driver
  • Mellanox Spectrum switches
Versions: Linux kernel versions before fixes in commits 4cad27ba2e5a and bcdfd615f83b
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Mellanox Spectrum switches with the mlxsw driver loaded. The vulnerability is in the driver's event processing logic.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical reboot of affected systems.

🟠

Likely Case

System instability or crashes when specific firmware events are processed for the CPU port, causing temporary service disruption.

🟢

If Mitigated

No impact if patched or if vulnerable driver not in use; limited to denial of service rather than privilege escalation.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific firmware events, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Could be triggered by local users or through management interfaces, potentially causing service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific firmware events for the CPU port, which may require local access or specific conditions. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 4cad27ba2e5a5843a7fab5aa30de2b8e8c3db3a8 and bcdfd615f83b4bd04678109bf18022d1476e4bbf

Vendor Advisory: https://git.kernel.org/stable/c/4cad27ba2e5a5843a7fab5aa30de2b8e8c3db3a8

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fixes. 2. Check kernel version includes commits 4cad27ba2e5a and bcdfd615f83b. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Unload mlxsw driver

linux

Temporarily disable the vulnerable driver if Mellanox Spectrum switches are not in use

modprobe -r mlxsw_spectrum
modprobe -r mlxsw_core

🧯 If You Can't Patch

  • Restrict local access to systems using Mellanox Spectrum switches
  • Monitor system logs for kernel panic events related to mlxsw driver

🔍 How to Verify

Check if Vulnerable:

Check if mlxsw driver is loaded: lsmod | grep mlxsw, then check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel includes fix commits: git log --oneline | grep -E '4cad27ba2e5a|bcdfd615f83b' or check kernel changelog

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • NULL pointer dereference errors in dmesg
  • mlxsw driver crash logs

Network Indicators:

  • Unexpected network interface drops on Mellanox ports

SIEM Query:

event_source="kernel" AND (message="NULL pointer dereference" OR message="mlxsw" OR message="kernel panic")

🔗 References

📤 Share & Export