CVE-2022-49565: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/lbr: Fix unchecked MSR access error on HSW The fuzzer triggers the below trace. [ 7763.384369] unchecked MSR access error: WRMSR to 0x689 (tried to write 0x1fffffff8101349e) at rIP: 0xffffffff810704a4 (native_write_msr+0x4/0x20) [ 7763.397420] Call Trace: [ 7763.399881] <TASK> [ 7763.401994] intel_pmu_lbr_restore+0x9a/0x1f0 [ 7763.406363] intel_pmu_lbr_sched_task+0x91/0x1c0 [ 7763.410992] __perf_event_task_sched_in+0x1cd/0x240 On a machine with the LBR format LBR_FORMAT_EIP_FLAGS2, when the TSX is disabled, a TSX quirk is required to access LBR from registers. The lbr_from_signext_quirk_needed() is introduced to determine whether the TSX quirk should be applied. However, the lbr_from_signext_quirk_needed() is invoked before the intel_pmu_lbr_init(), which parses the LBR format information. Without the correct LBR format information, the TSX quirk never be applied. Move the lbr_from_signext_quirk_needed() into the intel_pmu_lbr_init(). Checking x86_pmu.lbr_has_tsx in the lbr_from_signext_quirk_needed() is not required anymore. Both LBR_FORMAT_EIP_FLAGS2 and LBR_FORMAT_INFO have LBR_TSX flag, but only the LBR_FORMAT_EIP_FLAGS2 requirs the quirk. Update the comments accordingly.
AI Analysis
Technical Summary
CVE-2022-49565 is a vulnerability identified in the Linux kernel's performance monitoring unit (PMU) subsystem, specifically related to the Intel Last Branch Record (LBR) feature on x86 architectures. The issue arises from improper handling of Model-Specific Register (MSR) access errors when the Transactional Synchronization Extensions (TSX) feature is disabled on certain Intel processors using the LBR format LBR_FORMAT_EIP_FLAGS2. The vulnerability is due to a timing and logic flaw in the initialization sequence of the LBR handling code. The function lbr_from_signext_quirk_needed(), which determines if a TSX-specific quirk is required to correctly access LBR registers, is called before the intel_pmu_lbr_init() function that parses the LBR format information. Because the LBR format information is not yet available, the TSX quirk is never applied when it should be, leading to unchecked MSR access errors such as WRMSR to MSR address 0x689 with invalid data. This can cause kernel warnings or errors, potentially leading to instability or denial of service conditions. The fix involves moving the call to lbr_from_signext_quirk_needed() into the intel_pmu_lbr_init() function to ensure the quirk is applied only when appropriate, and updating the logic to no longer check the x86_pmu.lbr_has_tsx flag unnecessarily. This vulnerability is specific to Intel processors with the affected LBR format and TSX disabled, and impacts Linux kernel versions containing the flawed code. No known exploits are reported in the wild at this time.
Potential Impact
For European organizations running Linux on Intel-based servers or workstations, this vulnerability could lead to kernel instability or crashes when performance monitoring features are used, especially in environments that disable TSX for security or compatibility reasons. While it does not directly allow privilege escalation or remote code execution, the resulting kernel errors could disrupt critical services or monitoring tools that rely on PMU data, potentially causing denial of service. Organizations with high-reliability requirements or those using performance monitoring for security analytics might experience degraded operational effectiveness. The impact is more pronounced in environments that heavily utilize Intel PMU features or custom kernel builds with specific configurations. Since no known exploits exist, the immediate risk is low, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the bug.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2022-49565. Kernel maintainers have fixed the issue by adjusting the initialization sequence of the LBR handling code. Until patches are applied, administrators can consider temporarily disabling performance monitoring features related to Intel PMU or LBR on affected systems, especially if TSX is disabled, to avoid triggering the vulnerability. Monitoring kernel logs for unchecked MSR access errors can help identify affected systems. Additionally, organizations should review their kernel configuration and boot parameters to ensure TSX is enabled if compatible, as this may mitigate the quirk requirement. For environments where kernel updates are delayed, isolating affected systems or limiting access to reduce impact of potential instability is advisable. Close coordination with hardware vendors and Linux distribution maintainers is recommended to obtain timely patches and guidance.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-49565: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/lbr: Fix unchecked MSR access error on HSW The fuzzer triggers the below trace. [ 7763.384369] unchecked MSR access error: WRMSR to 0x689 (tried to write 0x1fffffff8101349e) at rIP: 0xffffffff810704a4 (native_write_msr+0x4/0x20) [ 7763.397420] Call Trace: [ 7763.399881] <TASK> [ 7763.401994] intel_pmu_lbr_restore+0x9a/0x1f0 [ 7763.406363] intel_pmu_lbr_sched_task+0x91/0x1c0 [ 7763.410992] __perf_event_task_sched_in+0x1cd/0x240 On a machine with the LBR format LBR_FORMAT_EIP_FLAGS2, when the TSX is disabled, a TSX quirk is required to access LBR from registers. The lbr_from_signext_quirk_needed() is introduced to determine whether the TSX quirk should be applied. However, the lbr_from_signext_quirk_needed() is invoked before the intel_pmu_lbr_init(), which parses the LBR format information. Without the correct LBR format information, the TSX quirk never be applied. Move the lbr_from_signext_quirk_needed() into the intel_pmu_lbr_init(). Checking x86_pmu.lbr_has_tsx in the lbr_from_signext_quirk_needed() is not required anymore. Both LBR_FORMAT_EIP_FLAGS2 and LBR_FORMAT_INFO have LBR_TSX flag, but only the LBR_FORMAT_EIP_FLAGS2 requirs the quirk. Update the comments accordingly.
AI-Powered Analysis
Technical Analysis
CVE-2022-49565 is a vulnerability identified in the Linux kernel's performance monitoring unit (PMU) subsystem, specifically related to the Intel Last Branch Record (LBR) feature on x86 architectures. The issue arises from improper handling of Model-Specific Register (MSR) access errors when the Transactional Synchronization Extensions (TSX) feature is disabled on certain Intel processors using the LBR format LBR_FORMAT_EIP_FLAGS2. The vulnerability is due to a timing and logic flaw in the initialization sequence of the LBR handling code. The function lbr_from_signext_quirk_needed(), which determines if a TSX-specific quirk is required to correctly access LBR registers, is called before the intel_pmu_lbr_init() function that parses the LBR format information. Because the LBR format information is not yet available, the TSX quirk is never applied when it should be, leading to unchecked MSR access errors such as WRMSR to MSR address 0x689 with invalid data. This can cause kernel warnings or errors, potentially leading to instability or denial of service conditions. The fix involves moving the call to lbr_from_signext_quirk_needed() into the intel_pmu_lbr_init() function to ensure the quirk is applied only when appropriate, and updating the logic to no longer check the x86_pmu.lbr_has_tsx flag unnecessarily. This vulnerability is specific to Intel processors with the affected LBR format and TSX disabled, and impacts Linux kernel versions containing the flawed code. No known exploits are reported in the wild at this time.
Potential Impact
For European organizations running Linux on Intel-based servers or workstations, this vulnerability could lead to kernel instability or crashes when performance monitoring features are used, especially in environments that disable TSX for security or compatibility reasons. While it does not directly allow privilege escalation or remote code execution, the resulting kernel errors could disrupt critical services or monitoring tools that rely on PMU data, potentially causing denial of service. Organizations with high-reliability requirements or those using performance monitoring for security analytics might experience degraded operational effectiveness. The impact is more pronounced in environments that heavily utilize Intel PMU features or custom kernel builds with specific configurations. Since no known exploits exist, the immediate risk is low, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the bug.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2022-49565. Kernel maintainers have fixed the issue by adjusting the initialization sequence of the LBR handling code. Until patches are applied, administrators can consider temporarily disabling performance monitoring features related to Intel PMU or LBR on affected systems, especially if TSX is disabled, to avoid triggering the vulnerability. Monitoring kernel logs for unchecked MSR access errors can help identify affected systems. Additionally, organizations should review their kernel configuration and boot parameters to ensure TSX is enabled if compatible, as this may mitigate the quirk requirement. For environments where kernel updates are delayed, isolating affected systems or limiting access to reduce impact of potential instability is advisable. Close coordination with hardware vendors and Linux distribution maintainers is recommended to obtain timely patches and guidance.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.410Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe4474
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 10:27:16 PM
Last updated: 8/1/2025, 9:12:58 AM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.