CVE-2022-49675

5.5 MEDIUM

📋 TL;DR

This CVE describes a Linux kernel vulnerability where an incorrectly exported initialization function could cause kernel panic if accessed after system initialization. The issue affects Linux systems using the tickless nohz_full feature. Only systems with specific configurations are vulnerable.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific versions between initial introduction of the bug and patched versions (exact range depends on distribution backports)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when tick_nohz_full feature is enabled and modules attempt to use the exported function after initialization.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical access to reboot the system.

🟠

Likely Case

System instability or crash if a module attempts to use the freed function, though this requires specific conditions.

🟢

If Mitigated

No impact if the system doesn't use the affected tick_nohz_full feature or if modules don't attempt to access the function.

🌐 Internet-Facing: LOW - This vulnerability requires local access or kernel module interaction, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or malicious modules could potentially trigger the issue, but requires specific conditions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specific conditions: local access, ability to load modules, and the tick_nohz_full feature to be enabled. No known public exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel stable releases via commits referenced in CVE

Vendor Advisory: https://git.kernel.org/stable/c/2390095113e98fc52fffe35c5206d30d9efe3f78

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. For custom kernels, apply the fix by removing EXPORT_SYMBOL_GPL from tick_nohz_full_setup() function. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable tick_nohz_full feature

linux

Prevent the vulnerable code path by disabling the tickless full feature

Add 'nohz_full=' to kernel boot parameters without CPU lists or set to empty

🧯 If You Can't Patch

  • Disable module loading via kernel parameter 'modules_disabled=1' if not required
  • Restrict local user access and monitor for suspicious module loading activity

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if tick_nohz_full is enabled: cat /proc/cmdline | grep nohz_full

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and check that tick_nohz_full_setup is not exported: grep tick_nohz_full_setup /proc/kallsyms

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • OOPs (kernel crashes) related to tick_nohz functions
  • Module loading failures

Network Indicators:

  • None - this is a local kernel issue

SIEM Query:

Search for kernel panic or OOPs messages in system logs with keywords: tick_nohz, panic, OOPs

🔗 References

📤 Share & Export