CVE-2022-50142
📋 TL;DR
This vulnerability in the Linux kernel's Intel TH (Trace Hub) MSU (Memory Storage Unit) driver allows improper handling of vmalloc-allocated DMA buffers after a kernel configuration change. This can lead to memory corruption or system crashes when the affected driver attempts to map these buffers. Systems running vulnerable Linux kernel versions with Intel TH hardware support are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic or system crash leading to denial of service, potentially allowing local privilege escalation if combined with other vulnerabilities.
Likely Case
System instability or crashes when the Intel TH MSU driver is used, particularly during memory mapping operations.
If Mitigated
Minimal impact if Intel TH hardware is not present or the driver is not loaded.
🎯 Exploit Status
Exploitation requires local access and triggering of the specific driver functionality. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 0ed72c6bc632cbf8d979ac60f982ff84b7bb610a, 4914c50670b6a531e2cb17cd984cc565b4681312, 566887bad7ff2297d6b3f9659c702ba075f3d62d, 6ae2881c1d1fa0e33f4763b7c786f8ef05a9c828, or ac12ad3ccf6d386e64a9d6a890595a2509d24edd
Vendor Advisory: https://git.kernel.org/stable/c/0ed72c6bc632cbf8d979ac60f982ff84b7bb610a
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable Intel TH MSU driver
linuxPrevent loading of the vulnerable driver module
echo 'blacklist intel_th_msu' >> /etc/modprobe.d/blacklist-intel-th.conf
update-initramfs -u
reboot
Unload driver if loaded
linuxRemove the driver module from running kernel
rmmod intel_th_msu
🧯 If You Can't Patch
- Ensure Intel TH hardware is not present or disabled in BIOS/UEFI
- Restrict local user access to systems with Intel TH hardware
🔍 How to Verify
Check if Vulnerable:
Check if Intel TH hardware is present: 'lspci | grep -i "trace hub"' and check if intel_th_msu module is loaded: 'lsmod | grep intel_th_msu'
Check Version:
uname -r
Verify Fix Applied:
Check kernel version against patched versions from your distribution, verify intel_th_msu module can be loaded without issues
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages related to intel_th_msu
- System crash/panic logs when using Intel TH functionality
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("intel_th_msu" OR "msc_mmap_fault")
🔗 References
- https://git.kernel.org/stable/c/0ed72c6bc632cbf8d979ac60f982ff84b7bb610a
- https://git.kernel.org/stable/c/4914c50670b6a531e2cb17cd984cc565b4681312
- https://git.kernel.org/stable/c/566887bad7ff2297d6b3f9659c702ba075f3d62d
- https://git.kernel.org/stable/c/6ae2881c1d1fa0e33f4763b7c786f8ef05a9c828
- https://git.kernel.org/stable/c/ac12ad3ccf6d386e64a9d6a890595a2509d24edd
- https://git.kernel.org/stable/c/b5d924cb4c7b952eaa61622f14427723a78137a3