Skip to main content

CVE-2022-49565: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49565cvecve-2022-49565
Published: Wed Feb 26 2025 (02/26/2025, 02:23:11 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/lbr: Fix unchecked MSR access error on HSW The fuzzer triggers the below trace. [ 7763.384369] unchecked MSR access error: WRMSR to 0x689 (tried to write 0x1fffffff8101349e) at rIP: 0xffffffff810704a4 (native_write_msr+0x4/0x20) [ 7763.397420] Call Trace: [ 7763.399881] <TASK> [ 7763.401994] intel_pmu_lbr_restore+0x9a/0x1f0 [ 7763.406363] intel_pmu_lbr_sched_task+0x91/0x1c0 [ 7763.410992] __perf_event_task_sched_in+0x1cd/0x240 On a machine with the LBR format LBR_FORMAT_EIP_FLAGS2, when the TSX is disabled, a TSX quirk is required to access LBR from registers. The lbr_from_signext_quirk_needed() is introduced to determine whether the TSX quirk should be applied. However, the lbr_from_signext_quirk_needed() is invoked before the intel_pmu_lbr_init(), which parses the LBR format information. Without the correct LBR format information, the TSX quirk never be applied. Move the lbr_from_signext_quirk_needed() into the intel_pmu_lbr_init(). Checking x86_pmu.lbr_has_tsx in the lbr_from_signext_quirk_needed() is not required anymore. Both LBR_FORMAT_EIP_FLAGS2 and LBR_FORMAT_INFO have LBR_TSX flag, but only the LBR_FORMAT_EIP_FLAGS2 requirs the quirk. Update the comments accordingly.

AI-Powered Analysis

AILast updated: 06/29/2025, 22:27:16 UTC

Technical Analysis

CVE-2022-49565 is a vulnerability identified in the Linux kernel's performance monitoring unit (PMU) subsystem, specifically related to the Intel Last Branch Record (LBR) feature on x86 architectures. The issue arises from improper handling of Model-Specific Register (MSR) access errors when the Transactional Synchronization Extensions (TSX) feature is disabled on certain Intel processors using the LBR format LBR_FORMAT_EIP_FLAGS2. The vulnerability is due to a timing and logic flaw in the initialization sequence of the LBR handling code. The function lbr_from_signext_quirk_needed(), which determines if a TSX-specific quirk is required to correctly access LBR registers, is called before the intel_pmu_lbr_init() function that parses the LBR format information. Because the LBR format information is not yet available, the TSX quirk is never applied when it should be, leading to unchecked MSR access errors such as WRMSR to MSR address 0x689 with invalid data. This can cause kernel warnings or errors, potentially leading to instability or denial of service conditions. The fix involves moving the call to lbr_from_signext_quirk_needed() into the intel_pmu_lbr_init() function to ensure the quirk is applied only when appropriate, and updating the logic to no longer check the x86_pmu.lbr_has_tsx flag unnecessarily. This vulnerability is specific to Intel processors with the affected LBR format and TSX disabled, and impacts Linux kernel versions containing the flawed code. No known exploits are reported in the wild at this time.

Potential Impact

For European organizations running Linux on Intel-based servers or workstations, this vulnerability could lead to kernel instability or crashes when performance monitoring features are used, especially in environments that disable TSX for security or compatibility reasons. While it does not directly allow privilege escalation or remote code execution, the resulting kernel errors could disrupt critical services or monitoring tools that rely on PMU data, potentially causing denial of service. Organizations with high-reliability requirements or those using performance monitoring for security analytics might experience degraded operational effectiveness. The impact is more pronounced in environments that heavily utilize Intel PMU features or custom kernel builds with specific configurations. Since no known exploits exist, the immediate risk is low, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the bug.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2022-49565. Kernel maintainers have fixed the issue by adjusting the initialization sequence of the LBR handling code. Until patches are applied, administrators can consider temporarily disabling performance monitoring features related to Intel PMU or LBR on affected systems, especially if TSX is disabled, to avoid triggering the vulnerability. Monitoring kernel logs for unchecked MSR access errors can help identify affected systems. Additionally, organizations should review their kernel configuration and boot parameters to ensure TSX is enabled if compatible, as this may mitigate the quirk requirement. For environments where kernel updates are delayed, isolating affected systems or limiting access to reduce impact of potential instability is advisable. Close coordination with hardware vendors and Linux distribution maintainers is recommended to obtain timely patches and guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.410Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe4474

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 10:27:16 PM

Last updated: 8/1/2025, 9:12:58 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats