CVE-2022-49781
📋 TL;DR
A race condition in the Linux kernel's AMD performance monitoring unit (PMU) can cause a NULL pointer dereference leading to kernel panic. This affects Linux systems with AMD processors when perf events are enabled. The vulnerability allows local attackers to crash the system.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local denial of service through kernel panic, requiring system reboot and potentially causing data loss or service disruption.
Likely Case
System crash when specific perf monitoring operations are performed concurrently, particularly on systems with heavy performance monitoring usage.
If Mitigated
Minimal impact if systems don't use perf monitoring extensively or have the patch applied.
🎯 Exploit Status
Exploitation requires local access and ability to trigger specific race conditions in perf event handling.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits baa014b9543c8e5e94f5d15b66abfe60750b8284 and fd5e454b856ed86b090336e269695d9908609b71
Vendor Advisory: https://git.kernel.org/stable/c/baa014b9543c8e5e94f5d15b66abfe60750b8284
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable perf events
linuxDisable the perf subsystem to prevent the race condition
echo 0 > /proc/sys/kernel/perf_event_paranoid
Disable perf events via kernel command line: perf_event=off
🧯 If You Can't Patch
- Restrict perf event usage to trusted users only
- Monitor for kernel panic events and investigate perf-related crashes
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if AMD processor is present: uname -r && grep -i amd /proc/cpuinfo
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched: uname -r should show version after fixes were backported
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages mentioning NULL pointer dereference at address 0000000000000198
- AMD PMU related crash logs
- perf event handler crashes
Network Indicators:
- None - local vulnerability only
SIEM Query:
search 'kernel: BUG: kernel NULL pointer dereference, address: 0000000000000198' OR 'amd_pmu_enable_all' in system logs