CVE-2022-49612

7.8 HIGH

📋 TL;DR

This CVE-2022-49612 is a Linux kernel vulnerability in power supply subsystem interpolation functions that causes out-of-bounds memory reads. It affects Linux systems with power management features enabled, potentially allowing attackers to crash systems or leak kernel memory. The vulnerability exists in boundary condition handling for temperature-to-resistance and OCV-to-capacity calculations.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions from commit a4585ba2050f460f749bbaf2b67bd56c41e30283 to fixes in stable branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with power supply subsystem enabled (common on laptops, embedded devices, servers with battery/power monitoring)

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, potential kernel memory disclosure, or local privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability, kernel crashes, or denial of service affecting power management functionality.

🟢

If Mitigated

Minimal impact if power supply features are disabled or systems are patched.

🌐 Internet-Facing: LOW - Requires local access or existing system compromise to exploit.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could trigger crashes affecting system availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to trigger specific power supply operations; no known public exploits as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel stable releases including commits 093d27bb6f2d1963f927ef59c9a2d37059175426 and a762cee5d933fe4e2e1b773d60fc74fb8248d8c4

Vendor Advisory: https://git.kernel.org/stable/c/093d27bb6f2d1963f927ef59c9a2d37059175426

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable power supply subsystem

Linux

Remove or disable power supply kernel module if not needed (not recommended for laptops or systems requiring power management)

modprobe -r power_supply_core
echo 'blacklist power_supply_core' > /etc/modprobe.d/disable-power-supply.conf

🧯 If You Can't Patch

  • Restrict local user access to systems with power management features
  • Implement kernel module signing and loading restrictions to prevent unauthorized module operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if power_supply_core module is loaded: 'uname -r' and 'lsmod | grep power_supply'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched: 'uname -r' should show version after fixes were backported

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages in /var/log/kern.log or dmesg
  • System crashes related to power_supply_core

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("power_supply" OR "out of bounds" OR "general protection fault")

🔗 References

📤 Share & Export