CVE-2022-50366

7.1 HIGH

📋 TL;DR

This CVE is a Linux kernel vulnerability in the Intel RAPL power capping subsystem where improper input validation leads to an undefined behavior shift operation. Attackers with local access could trigger a kernel panic or potentially execute arbitrary code. Affects systems running vulnerable Linux kernel versions with Intel processors supporting RAPL.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific vulnerable versions not explicitly stated in CVE, but patches available in stable kernel trees
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel processors with RAPL (Running Average Power Limit) support. Most modern Intel CPUs are affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution leading to complete system compromise

🟠

Likely Case

Kernel panic causing denial of service (system crash)

🟢

If Mitigated

No impact if patched or workaround applied

🌐 Internet-Facing: LOW - Requires local access to exploit
🏢 Internal Only: MEDIUM - Malicious insiders or compromised accounts could exploit

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple local trigger via sysfs interface

Exploitation requires write access to /sys/class/powercap/intel-rapl/*/constraint_*_time_window_us files

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in stable kernel versions via commits referenced in CVE

Vendor Advisory: https://git.kernel.org/stable/c/139bbbd01114433b80fe59f5e1330615aadf9752

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable RAPL sysfs interface

linux

Remove write permissions from RAPL constraint time window files

chmod a-w /sys/class/powercap/intel-rapl/*/constraint_*_time_window_us

🧯 If You Can't Patch

  • Apply workaround to restrict write access to RAPL sysfs files
  • Implement strict access controls to prevent unauthorized local users from accessing power management interfaces

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if RAPL sysfs interface exists: ls -la /sys/class/powercap/intel-rapl/

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to patched version and test that writing invalid values to constraint time window files doesn't crash system

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs mentioning 'shift exponent too large' or 'UBSAN shift-out-of-bounds'
  • System crash/reboot events

Network Indicators:

  • No network indicators - local exploit only

SIEM Query:

Search for kernel panic events or system crashes with powercap/rapl related context

🔗 References

📤 Share & Export