CVE-2022-49952

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in the Linux kernel's fastrpc driver allows attackers to write beyond allocated memory boundaries when too many sessions are defined in devicetree. This affects Linux systems using the fastrpc driver for Qualcomm DSP communication. Attackers with local access could potentially escalate privileges or crash the system.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with vulnerable fastrpc driver (specific versions depend on distribution backports)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if fastrpc driver is loaded and devicetree defines more than FASTRPC_MAX_SESSIONS sessions. Common on Qualcomm-based systems.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level access, allowing complete system compromise and potential persistence.

🟠

Likely Case

Kernel panic leading to denial of service (system crash) or limited memory corruption affecting system stability.

🟢

If Mitigated

No impact if the vulnerable driver is not loaded or if session count is limited below FASTRPC_MAX_SESSIONS threshold.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this for privilege escalation or DoS attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to influence devicetree configuration or trigger probe conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel commits: 0e33b0f322fecd7a92d9dc186535cdf97940a856, 9baa1415d9abdd1e08362ea2dcfadfacee8690b5, c0425c2facd9166fa083f90c9f3187ace0c7837a, c99bc901d5eb9fbdd7bd39f625e170ce97390336, ec186b9f4aa2e6444d5308a6cc268aada7007639

Vendor Advisory: https://git.kernel.org/stable/c/0e33b0f322fecd7a92d9dc186535cdf97940a856

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check distribution-specific security advisories. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable fastrpc driver

linux

Prevent loading of vulnerable fastrpc driver module

echo 'blacklist fastrpc' >> /etc/modprobe.d/blacklist.conf
rmmod fastrpc

Limit devicetree sessions

linux

Ensure devicetree configuration doesn't exceed FASTRPC_MAX_SESSIONS

Check devicetree: cat /proc/device-tree/fastrpc/sessions | wc -l

🧯 If You Can't Patch

  • Restrict local user access to prevent exploitation
  • Implement kernel module signing to prevent unauthorized driver loading

🔍 How to Verify

Check if Vulnerable:

Check if fastrpc module is loaded: lsmod | grep fastrpc. Check kernel version: uname -r and compare with patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits. Check dmesg for fastrpc errors after driver load.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Out of bounds memory access errors in dmesg
  • fastrpc driver crash logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("fastrpc" OR "out of bounds" OR "memory corruption")

🔗 References

📤 Share & Export