CVE-2022-49623

7.1 HIGH

📋 TL;DR

This CVE-2022-49623 is a memory corruption vulnerability in the Linux kernel's PowerPC XIVE interrupt controller implementation. It allows attackers to cause out-of-bounds memory reads/writes through specially crafted interrupt requests, potentially leading to system crashes or privilege escalation. Systems running affected Linux kernel versions on PowerPC architecture with XIVE interrupt controller enabled are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before the fix commits: 10f2cd373e65bcd3be8f3cdc71c330c25763dfd8, 19fc5bb93c6bbdce8292b4d7eed04e2fa118d2fe, 99d1c36bddd93919072b5a51a89297bbb5ad6a6f
Operating Systems: Linux distributions running on PowerPC architecture with XIVE support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PowerPC systems using the XIVE interrupt controller (typically IBM Power systems). x86/ARM systems are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential privilege escalation allowing attackers to gain root access and execute arbitrary code.

🟠

Likely Case

System crash or kernel panic causing denial of service, requiring physical or remote console access to reboot.

🟢

If Mitigated

No impact if patched or if XIVE interrupt controller is not enabled/used.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific interrupt conditions.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger the vulnerability to crash systems or escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger specific interrupt conditions. The vulnerability is triggered during system initialization when allocating interrupt resources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing the fix commits

Vendor Advisory: https://git.kernel.org/stable/c/10f2cd373e65bcd3be8f3cdc71c330c25763dfd8

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (yum update kernel, apt-get upgrade linux-image, etc.). 3. For custom kernels: Apply patches from kernel.org and rebuild.

🔧 Temporary Workarounds

Disable XIVE interrupt controller

PowerPC systems

Use legacy interrupt controller instead of XIVE if possible

Add 'xive=off' to kernel boot parameters

🧯 If You Can't Patch

  • Restrict local user access to prevent potential privilege escalation
  • Implement strict process isolation and resource limits

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if running on PowerPC with XIVE: uname -r and check /proc/interrupts for XIVE entries

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits and check dmesg for XIVE initialization errors

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN reports of slab-out-of-bounds in xive_spapr_get_ipi
  • System crashes during boot

Network Indicators:

  • None - local vulnerability

SIEM Query:

search 'kernel panic' OR 'KASAN' OR 'slab-out-of-bounds' AND 'xive'

🔗 References

📤 Share & Export