CVE-2022-50087

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's ARM SCPI firmware driver. If exploited, it could allow local attackers to execute arbitrary code or crash the system by triggering memory corruption. This affects Linux systems using ARM-based hardware with the SCPI firmware interface.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions running on ARM-based hardware with SCPI firmware support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using ARM SCPI firmware interface. Most ARM servers and some embedded systems are potentially vulnerable if using affected kernel versions.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, potentially leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Kernel panic leading to system crash and denial of service, requiring physical or remote console access to reboot.

🟢

If Mitigated

No impact if proper kernel hardening and access controls prevent local users from triggering the vulnerable code path.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring local access to exploit.
🏢 Internal Only: MEDIUM - Internal users with shell access could potentially exploit this for privilege escalation or denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger SCPI probe failure conditions. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 08272646cd7c310642c39b7f54348fddd7987643, 0c29e149b6bb498778ed8a1c9597b51acfba7856, 18048cba444a7c41dbf42c180d6b46606fc24c51, 4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87, 5aa558232edc30468d1f35108826dd5b3ffe978f

Vendor Advisory: https://git.kernel.org/stable/c/08272646cd7c310642c39b7f54348fddd7987643

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable SCPI firmware module

linux

Prevent loading of the vulnerable scpi driver module

echo 'blacklist scpi' >> /etc/modprobe.d/blacklist.conf
rmmod scpi

🧯 If You Can't Patch

  • Restrict local user access to prevent potential exploitation
  • Implement kernel hardening features like SELinux/AppArmor to limit damage scope

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if scpi module is loaded: lsmod | grep scpi && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits and scpi module loads without errors in dmesg

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages in dmesg
  • System crashes/panics related to scpi module

Network Indicators:

  • None - local vulnerability only

SIEM Query:

search 'kernel: scpi' OR 'kernel: Oops' OR 'kernel: general protection fault' in system logs

🔗 References

📤 Share & Export