CVE-2022-1353

7.1 HIGH

📋 TL;DR

A local privilege escalation vulnerability in the Linux kernel's pfkey_register function allows unprivileged local users to access kernel memory. This can lead to system crashes or information disclosure. Only systems running vulnerable Linux kernel versions are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before commit 9a564bccb78a76740ea9d75a259942df8143d02c (mainlined in kernel 5.17-rc1)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires CONFIG_NET_KEY to be enabled (common in most distributions).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via kernel memory corruption leading to root access, system crash, or sensitive kernel data exposure.

🟠

Likely Case

Local denial of service (system crash) or limited kernel memory information leakage by a local user.

🟢

If Mitigated

Minimal impact if proper access controls prevent local user accounts or if kernel hardening is in place.

🌐 Internet-Facing: LOW - Requires local access to exploit, cannot be triggered remotely.
🏢 Internal Only: MEDIUM - Local users on affected systems could cause crashes or information leaks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local user access. Proof-of-concept code exists in public bug reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.17-rc1 and later, or backported patches for stable kernels

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2066819

Restart Required: Yes

Instructions:

1. Update Linux kernel to version 5.17-rc1 or later. 2. For older kernels, apply backported patch from vendor. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable NET_KEY module

linux

Prevents loading of the vulnerable kernel module

echo 'install net-pf-16 /bin/true' >> /etc/modprobe.d/disable-netkey.conf
rmmod af_key

Restrict local user access

all

Limit who can log into affected systems

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local user accounts
  • Monitor system logs for crash events or unusual kernel activity

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r. If before 5.17-rc1, check if CONFIG_NET_KEY=y in /boot/config-$(uname -r)

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is 5.17-rc1 or later, or check if patch is applied via vendor-specific commands

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • System crash dumps
  • Unexpected system reboots

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "general protection fault")

🔗 References

📤 Share & Export