CVE-2022-49792

7.1 HIGH

📋 TL;DR

This CVE-2022-49792 is an out-of-bounds read vulnerability in the Linux kernel's mp2629 ADC driver. It could allow local attackers to read kernel memory beyond allocated boundaries, potentially exposing sensitive information. Systems using affected Linux kernel versions with the mp2629 ADC driver are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with vulnerable mp2629 ADC driver implementation before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the mp2629 ADC driver (typically embedded/IoT devices with MP2629 power management IC)

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leaks, potential privilege escalation if combined with other vulnerabilities, or system instability/crashes.

🟠

Likely Case

Information disclosure of kernel memory contents, potentially exposing sensitive data or system state information to local attackers.

🟢

If Mitigated

Minimal impact with proper kernel hardening, SELinux/AppArmor, and restricted local access.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from network.
🏢 Internal Only: MEDIUM - Local attackers or compromised user accounts could exploit this to gather system information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of driver usage. No public exploits known as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 1678d4abb2dc2ca3b05b998a9d88616976e4f947, 399b2105a2240e730b9f3880bd8f154247539aa7, ca1547ab15f48dc81624183ae17a2fd1bad06dfc, d95b85c5084ad70011988861ee864529eefa1da0

Vendor Advisory: https://git.kernel.org/stable/c/1678d4abb2dc2ca3b05b998a9d88616976e4f947

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable mp2629 ADC driver module

linux

Prevent loading of vulnerable driver module if not needed

echo 'blacklist mp2629_adc' >> /etc/modprobe.d/blacklist.conf
rmmod mp2629_adc

🧯 If You Can't Patch

  • Restrict local access to systems using mp2629 ADC hardware
  • Implement strict kernel hardening and memory protection mechanisms

🔍 How to Verify

Check if Vulnerable:

Check if mp2629 ADC driver is loaded: lsmod | grep mp2629; and check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and mp2629 driver loads without errors in dmesg

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • Driver initialization failures in dmesg
  • Unexpected memory access patterns

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("mp2629" OR "out of bounds" OR "oops")

🔗 References

📤 Share & Export