CVE-2022-49703
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's ibmvfc SCSI driver allows a crash during kexec/kdump operations on Power 9 systems with legacy XICS interrupt controllers. This can cause kernel panics and system instability, primarily affecting Linux systems running on IBM Power 9 hardware with specific interrupt controller configurations.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially disrupting critical operations during kexec/kdump scenarios.
Likely Case
System crash during kexec/kdump operations on vulnerable Power 9 systems, causing downtime and failed crash dump collection.
If Mitigated
No impact if systems are patched or don't use the vulnerable configuration.
🎯 Exploit Status
Exploitation requires specific hardware configuration and timing during kexec/kdump operations. No known public exploits.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 6d38e3b614ded59da8b95377a98df969a5a5627a, 8540f66196ca35b7b5e902932571c18b9fde0cd1, aeaadcde1a60138bceb65de3cdaeec78170b4459
Vendor Advisory: https://git.kernel.org/stable/c/6d38e3b614ded59da8b95377a98df969a5a5627a
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify ibmvfc driver version includes the fix.
🔧 Temporary Workarounds
Disable ibmvfc driver
linuxPrevent loading of vulnerable ibmvfc driver if not required
echo 'blacklist ibmvfc' >> /etc/modprobe.d/blacklist.conf
rmmod ibmvfc
Use modern interrupt controller
linuxConfigure system to use XIVE instead of legacy XICS interrupt controller
Add 'xive=on' to kernel boot parameters in GRUB configuration
🧯 If You Can't Patch
- Avoid kexec/kdump operations on vulnerable Power 9 systems
- Ensure proper backup and recovery procedures for systems that might crash during maintenance
🔍 How to Verify
Check if Vulnerable:
Check if running on Power 9 hardware with: cat /proc/cpuinfo | grep -i power9 && check if ibmvfc module is loaded: lsmod | grep ibmvfc
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes fix commits: git log --oneline | grep -E '6d38e3b|8540f66|aeaadcd'
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages mentioning ibmvfc_interrupt_scsi
- NULL pointer dereference errors at address 0x58
- Oops messages with ibmvfc in call trace
Network Indicators:
- None - local kernel vulnerability
SIEM Query:
source="kernel" AND ("ibmvfc" OR "NULL pointer dereference" OR "Oops: Kernel access of bad area")