CVE-2022-49745
📋 TL;DR
This CVE addresses a resource leak vulnerability in the Linux kernel's FPGA Intel Max 10 BMC Secure Update driver (m10bmc-sec). The driver fails to properly handle error conditions during device probe, potentially leading to memory or resource leaks. This affects Linux systems using Intel Max 10 FPGA hardware with the vulnerable driver loaded.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential information disclosure through uninitialized memory.
Likely Case
Local attackers with ability to trigger probe failures could cause resource leaks leading to gradual system degradation or denial of service over time.
If Mitigated
With proper access controls and monitoring, impact is limited to local denial of service requiring physical or privileged access to trigger.
🎯 Exploit Status
Exploitation requires local access and ability to trigger specific error conditions during device probe. No known public exploits exist.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits 60ce26d10e5850f33cc76fce52f5377045e75a15 and 74cff472d3d66db13b5ef64f40dfa42383f71ff7
Vendor Advisory: https://git.kernel.org/stable/c/60ce26d10e5850f33cc76fce52f5377045e75a15
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load patched kernel. 3. Verify module is properly loaded if FPGA hardware is present.
🔧 Temporary Workarounds
Disable vulnerable module
linuxPrevent loading of the vulnerable fpga-m10bmc-sec kernel module
echo 'blacklist fpga-m10bmc-sec' >> /etc/modprobe.d/blacklist.conf
rmmod fpga-m10bmc-sec
🧯 If You Can't Patch
- Restrict local access to systems with vulnerable driver loaded
- Monitor system resource usage for unusual memory consumption patterns
🔍 How to Verify
Check if Vulnerable:
Check if fpga-m10bmc-sec module is loaded: lsmod | grep fpga-m10bmc-sec
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes fix commits or verify module version after update
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages related to fpga-m10bmc-sec
- System log entries showing resource exhaustion
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
Search for kernel panic or oops events containing 'fpga-m10bmc-sec' or 'm10bmc'