CVE-2022-49783
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49783 affects the Linux kernel and involves a vulnerability in the x86/fpu subsystem where the fpregs lock is incorrectly held during FPU permissions inheritance. The issue was discovered when a bug report showed a sleeping function being called from an invalid context in the preempt-rt kernel tree (NVD CVE).

Technical details

The vulnerability stems from fpuinheritperms() being called under fpregslock(), leading to a spinlockirq() call when fpustatesizedynamic() returns true, despite the static key _fpustatesizedynamic never being enabled. The issue exists since commit 9e798e9aa14c ('x86/fpu: Prepare fpuclone() for dynamically enabled features'). On a PREEMPTRT kernel, fpregslock disables preemption, making the spinlockirq() call in fpuinherit_perms() unsafe (NVD CVE).

Impact

The vulnerability can cause system instability and potential deadlocks in the Linux kernel when processes are being created, particularly affecting systems running with the PREEMPT_RT patch. The issue specifically impacts the process creation path when FPU state inheritance occurs (NVD CVE).

Mitigation and workarounds

The fix involves dropping the fpregslock before calling fpuinheritperms(), as it is not necessary for protecting the FPU state during this operation. The siglock is still required to be acquired by fpuinherit_perms() to serialize the reading of the parent's permissions (NVD CVE).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management