CVE-2022-0516

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in the KVM subsystem for s390 architecture in Linux kernel allows a local attacker with normal user privileges to gain unauthorized memory write access. This affects Linux kernel versions prior to 5.17-rc4. The flaw is in the kvm_s390_guest_sida_op function in arch/s390/kvm/kvm-s390.c.

💻 Affected Systems

Products:
  • Linux kernel with KVM support for s390 architecture
Versions: Linux kernel versions prior to 5.17-rc4
Operating Systems: Linux distributions running affected kernel versions on s390/s390x architecture
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using KVM virtualization on IBM s390/s390x architecture. x86/ARM systems are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains kernel-level privileges, leading to full system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local user escalates privileges to root, enabling unauthorized access to sensitive data and system resources.

🟢

If Mitigated

Impact limited to isolated environments with strict user privilege separation and no local untrusted users.

🌐 Internet-Facing: LOW (requires local access, not remotely exploitable)
🏢 Internal Only: HIGH (local users can exploit this to gain root privileges)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local user access and knowledge of s390 architecture. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.17-rc4 and later

Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55

Restart Required: Yes

Instructions:

1. Update Linux kernel to version 5.17-rc4 or later. 2. For distributions: Apply vendor patches (Red Hat, Debian, etc.). 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable KVM on s390

linux

Disable KVM virtualization support if not required on s390 systems

modprobe -r kvm
echo 'blacklist kvm' >> /etc/modprobe.d/blacklist.conf

Restrict user access

all

Limit local user accounts and implement strict privilege separation

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts
  • Monitor for privilege escalation attempts and unusual kernel activity

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r. If version is earlier than 5.17-rc4 and system uses s390 architecture with KVM enabled, it's vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is 5.17-rc4 or later: uname -r. Check that KVM module is loaded only if necessary.

📡 Detection & Monitoring

Log Indicators:

  • Failed privilege escalation attempts
  • Unusual kernel module activity
  • Suspicious access to /dev/kvm

Network Indicators:

  • None (local exploit only)

SIEM Query:

source="kernel" AND (event="privilege_escalation" OR module="kvm")

🔗 References

📤 Share & Export