CVE-2022-48754

8.4 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's phylib subsystem. The vulnerability occurs when the kernel attempts to reset a network PHY device after it has already been freed, potentially allowing attackers to execute arbitrary code or crash the system. This affects all Linux systems using the affected kernel versions with network interfaces that utilize the phylib subsystem.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing commit bafbdd527d56 up to the fix commits
Operating Systems: All Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires systems using network interfaces that utilize the phylib subsystem. The vulnerability is triggered during network device detachment.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to arbitrary code execution with kernel privileges, system crashes, or complete system compromise.

🟠

Likely Case

Kernel panic or system crash resulting in denial of service, potentially requiring physical access or reboot to restore functionality.

🟢

If Mitigated

No impact if patched or if the specific code path isn't triggered during normal operation.

🌐 Internet-Facing: MEDIUM - Requires local access or ability to trigger the specific network device detach sequence, but could be combined with other vulnerabilities.
🏢 Internal Only: MEDIUM - Local attackers or malicious processes could potentially trigger the vulnerability to escalate privileges or cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires triggering the specific code path during network device detachment, which typically requires local access or ability to manipulate network interfaces.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 67d271760b037ce0806d687ee6057edc8afd4205, aefaccd19379d6c4620269a162bfb88ff687f289, bd024e36f68174b1793906c39ca16cee0c9295c2, cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af, cbda1b16687580d5beee38273f6241ae3725960c

Vendor Advisory: https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution vendor. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version.

🔧 Temporary Workarounds

Avoid network device hot-unplug

linux

Prevent triggering the vulnerable code path by avoiding dynamic network device removal

🧯 If You Can't Patch

  • Restrict local access to prevent potential privilege escalation attempts
  • Monitor system logs for kernel panics or unexpected network device detachment events

🔍 How to Verify

Check if Vulnerable:

Check kernel version against affected ranges and verify if phylib subsystem is present: 'uname -r' and check if system uses network devices with PHY support

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is newer than the fix commits: 'uname -r' and compare with distribution's patched versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Use-after-free kernel warnings
  • Network device detachment errors in dmesg

Network Indicators:

  • Unexpected network interface disconnections

SIEM Query:

search 'kernel panic' OR 'use-after-free' OR 'BUG:' in system logs

🔗 References

📤 Share & Export