CVE-2022-50093
📋 TL;DR
This vulnerability in the Linux kernel's Intel IOMMU driver allows invalid memory access when ACPI NUMA is disabled. It can cause kernel crashes or potential privilege escalation by reading/writing arbitrary kernel memory. Affects Linux systems with Intel processors using the IOMMU driver.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, or potential privilege escalation allowing attackers to execute arbitrary code in kernel context.
Likely Case
System instability, kernel crashes, or denial of service when the vulnerable code path is triggered.
If Mitigated
System remains stable with proper patching; unpatched systems may experience crashes under specific configurations.
🎯 Exploit Status
Exploitation requires triggering specific kernel code paths and may be challenging to weaponize reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Various kernel versions with commit 0b4c0003aeda32a600f95df53b2848da8a5aa3fa or later
Vendor Advisory: https://git.kernel.org/stable/c/0b4c0003aeda32a600f95df53b2848da8a5aa3fa
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. For custom kernels, apply commit 0b4c0003aeda32a600f95df53b2848da8a5aa3fa. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Enable ACPI NUMA
linuxEnsure ACPI NUMA is not disabled via kernel command line
Remove 'numa=off' from kernel boot parameters in /etc/default/grub or bootloader config
🧯 If You Can't Patch
- Ensure ACPI NUMA is enabled (remove 'numa=off' from kernel parameters)
- Restrict local user access to prevent potential privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check kernel version and boot parameters: 'uname -r' and 'cat /proc/cmdline' for 'numa=off'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and check that 'numa=off' is not present in boot parameters
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN reports of wild-memory-access in dmar_parse_one_rhsa
- System crashes during boot with NUMA disabled
Network Indicators:
- None - local vulnerability only
SIEM Query:
Search for kernel logs containing 'KASAN: wild-memory-access' or 'dmar_parse_one_rhsa'
🔗 References
- https://git.kernel.org/stable/c/0b4c0003aeda32a600f95df53b2848da8a5aa3fa
- https://git.kernel.org/stable/c/5659efdadf04b56707d58c1b758df16d2e0eff2c
- https://git.kernel.org/stable/c/73ce2046e04ad488cecc66757c36cbe1bdf089d4
- https://git.kernel.org/stable/c/b0b0b77ea611e3088e9523e60860f4f41b62b235
- https://git.kernel.org/stable/c/b12304984654d8e58a2b22ff94c4410906d6267f
- https://git.kernel.org/stable/c/c2304c50f4d94f56c2e326f25c9dc8cf2ba6f5fa