CVE-2022-50492

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's MSM DRM driver that occurs during device probe deferral. When the kernel tears down and recreates DRM devices due to deferred probing, stale pointers to freed memory structures can be accessed, potentially leading to memory corruption. This affects Linux systems using Qualcomm MSM graphics hardware.

💻 Affected Systems

Products:
  • Linux kernel with MSM DRM driver
Versions: Linux kernel versions before the fix commits (0a30a47741b6df1f9555a0fac6aebb7e8c363bad and 6808abdb33bf90330e70a687d29f038507e06ebb)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires MSM DRM driver to be loaded (typically on Qualcomm-based systems). Systems without MSM graphics hardware are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to system crash, privilege escalation, or arbitrary code execution at kernel level.

🟠

Likely Case

System instability, kernel panics, or crashes during device initialization, particularly with multiple display bridges.

🟢

If Mitigated

System remains stable with proper patching; unpatched systems may experience crashes during device probe operations.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring local access to trigger.
🏢 Internal Only: MEDIUM - Local users or processes could potentially exploit this to cause system instability or privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and specific conditions to trigger the use-after-free. The vulnerability occurs during device probe deferral scenarios.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 0a30a47741b6df1f9555a0fac6aebb7e8c363bad and 6808abdb33bf90330e70a687d29f038507e06ebb

Vendor Advisory: https://patchwork.freedesktop.org/patch/502665/

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable MSM DRM module

linux

Prevent loading of the vulnerable MSM DRM driver if not needed

echo 'blacklist msm' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u

🧯 If You Can't Patch

  • Restrict local user access to systems with MSM hardware
  • Monitor system logs for kernel panic or oops messages related to DRM/MSM

🔍 How to Verify

Check if Vulnerable:

Check if MSM DRM module is loaded: lsmod | grep msm. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: git log --oneline | grep -E '0a30a47741b6df1f9555a0fac6aebb7e8c363bad|6808abdb33bf90330e70a687d29f038507e06ebb'

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes during device initialization
  • DRM/MSM related error messages in dmesg

Network Indicators:

  • None - local vulnerability

SIEM Query:

Search for: 'kernel: BUG:', 'kernel: Oops:', 'drm_msm' in system logs

🔗 References

📤 Share & Export