CVE-2022-48793

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the KVM (Kernel-based Virtual Machine) subsystem of the Linux kernel. During nested virtualization migration, improper initialization order could cause KVM to crash the host kernel, leading to denial of service. This affects systems running Linux with KVM enabled and using nested virtualization features.

💻 Affected Systems

Products:
  • Linux kernel with KVM virtualization
Versions: Specific kernel versions between the introduction of the bug and its fix (exact range depends on distribution backports)
Operating Systems: Linux distributions with KVM support
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when KVM is enabled AND nested virtualization is being used. Most default configurations do not enable nested virtualization.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Host kernel panic leading to complete system crash and denial of service for all VMs and services on the affected host.

🟠

Likely Case

System crash or instability during nested VM migration operations, causing temporary service disruption.

🟢

If Mitigated

No impact if nested virtualization is disabled or migration operations are avoided.

🌐 Internet-Facing: LOW - Requires local access to the host system and specific nested virtualization operations.
🏢 Internal Only: MEDIUM - Could be exploited by malicious users with access to create or migrate nested VMs on shared infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access to the host system, ability to create/migrate nested VMs, and triggering the specific code path during migration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.16.12, 5.15.25, 5.10.102 and later stable versions

Vendor Advisory: https://git.kernel.org/stable/c/352193edda48e08e8824a7ece09aec830a603cfe

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot the system to load the new kernel. 3. Verify the kernel version matches patched release.

🔧 Temporary Workarounds

Disable nested virtualization

linux

Prevents the vulnerable code path from being executed by disabling nested SVM/VMX features

echo 'options kvm-intel nested=0' > /etc/modprobe.d/kvm-intel.conf
echo 'options kvm-amd nested=0' > /etc/modprobe.d/kvm-amd.conf
update-initramfs -u
reboot

Avoid nested VM migration

all

Operational workaround to prevent triggering the vulnerability

🧯 If You Can't Patch

  • Disable nested virtualization features completely
  • Restrict VM migration operations to trusted administrators only

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if nested virtualization is enabled: cat /sys/module/kvm_intel/parameters/nested or cat /sys/module/kvm_amd/parameters/nested

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched: uname -r and check it matches patched versions from your distribution

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • KVM-related crash reports
  • Unexpected host reboots during VM migration

Network Indicators:

  • Sudden loss of connectivity to VMs during migration operations

SIEM Query:

source="kern.log" AND "kernel panic" AND ("KVM" OR "nested")

🔗 References

📤 Share & Export