CVE-2022-49745

5.5 MEDIUM

📋 TL;DR

This CVE addresses a resource leak vulnerability in the Linux kernel's FPGA Intel Max 10 BMC Secure Update driver (m10bmc-sec). The driver fails to properly handle error conditions during device probe, potentially leading to memory or resource leaks. This affects Linux systems using Intel Max 10 FPGA hardware with the vulnerable driver loaded.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing the vulnerable m10bmc-sec driver code before fixes were applied
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the fpga-m10bmc-sec module is loaded (typically only when Intel Max 10 FPGA hardware is present and being used)

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential information disclosure through uninitialized memory.

🟠

Likely Case

Local attackers with ability to trigger probe failures could cause resource leaks leading to gradual system degradation or denial of service over time.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to local denial of service requiring physical or privileged access to trigger.

🌐 Internet-Facing: LOW - This is a local kernel driver vulnerability requiring local access to exploit.
🏢 Internal Only: MEDIUM - Internal users with local access could potentially exploit this to cause system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger specific error conditions during device probe. No known public exploits exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 60ce26d10e5850f33cc76fce52f5377045e75a15 and 74cff472d3d66db13b5ef64f40dfa42383f71ff7

Vendor Advisory: https://git.kernel.org/stable/c/60ce26d10e5850f33cc76fce52f5377045e75a15

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load patched kernel. 3. Verify module is properly loaded if FPGA hardware is present.

🔧 Temporary Workarounds

Disable vulnerable module

linux

Prevent loading of the vulnerable fpga-m10bmc-sec kernel module

echo 'blacklist fpga-m10bmc-sec' >> /etc/modprobe.d/blacklist.conf
rmmod fpga-m10bmc-sec

🧯 If You Can't Patch

  • Restrict local access to systems with vulnerable driver loaded
  • Monitor system resource usage for unusual memory consumption patterns

🔍 How to Verify

Check if Vulnerable:

Check if fpga-m10bmc-sec module is loaded: lsmod | grep fpga-m10bmc-sec

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits or verify module version after update

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages related to fpga-m10bmc-sec
  • System log entries showing resource exhaustion

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for kernel panic or oops events containing 'fpga-m10bmc-sec' or 'm10bmc'

🔗 References

📤 Share & Export