CVE-2022-1651
📋 TL;DR
A memory leak vulnerability in the Linux kernel's ACRN hypervisor device model allows local privileged attackers to leak kernel memory information, potentially leading to denial of service. This affects systems running Linux kernels with ACRN virtualization support enabled. Attackers need local access with sufficient privileges to exploit this flaw.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Privileged attacker leaks sensitive kernel memory contents, potentially exposing credentials or cryptographic keys, and causes kernel memory exhaustion leading to system crash.
Likely Case
Local attacker with appropriate privileges causes memory exhaustion and system instability or denial of service through repeated exploitation.
If Mitigated
With proper access controls limiting local privilege escalation, impact is minimal as only authorized users can trigger the vulnerability.
🎯 Exploit Status
Exploitation requires local access and sufficient privileges to interact with ACRN device model interfaces. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel commit ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b and later
Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing commit ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b. 2. Reboot system to load new kernel. 3. Verify ACRN virtualization is not required or disable if not needed.
🔧 Temporary Workarounds
Disable ACRN virtualization
linuxDisable ACRN hypervisor support if not required for system functionality
modprobe -r acrn_hsm
echo 'blacklist acrn_hsm' >> /etc/modprobe.d/blacklist.conf
Restrict device access
linuxLimit access to ACRN device interfaces to prevent exploitation
chmod 600 /dev/acrn_hsm
setfacl -m u:root:rw- /dev/acrn_hsm
🧯 If You Can't Patch
- Disable ACRN virtualization module if not required for operations
- Implement strict access controls to limit which users can interact with ACRN device interfaces
🔍 How to Verify
Check if Vulnerable:
Check if ACRN module is loaded: lsmod | grep acrn_hsm. If loaded, check kernel version against patched commit.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel includes commit ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b: git log --oneline | grep ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b
📡 Detection & Monitoring
Log Indicators:
- Kernel oom-killer messages
- ACRN device model error logs
- Memory allocation failures in kernel logs
Network Indicators:
- No network indicators - local vulnerability only
SIEM Query:
source="kernel" AND ("acrn" OR "oom-killer" OR "memory allocation failure")
🔗 References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b
- https://security.netapp.com/advisory/ntap-20220901-0008/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b
- https://security.netapp.com/advisory/ntap-20220901-0008/