CVE-2022-48796
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's IOMMU subsystem. When a device probe fails and frees memory, a parallel deferred probe worker can access the freed memory, potentially leading to kernel crashes or privilege escalation. This affects Linux systems with IOMMU support enabled.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, or potential privilege escalation to kernel mode allowing full system compromise.
Likely Case
System instability, kernel crashes, or denial of service due to memory corruption.
If Mitigated
System remains stable with proper patching; unpatched systems may experience occasional crashes during device probing.
🎯 Exploit Status
Exploitation requires precise timing and local access. The race condition makes reliable exploitation challenging.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 65ab30f6a6952fa9ee13009862736cf8d110e6e5, b54240ad494300ff0994c4539a531727874381f4, cb86e511e78e796de6947b8f3acca1b7c76fb2ff, f74fc4b5bd533ea3d30ce47cccb8ef8d21fda85a
Vendor Advisory: https://git.kernel.org/stable/c/65ab30f6a6952fa9ee13009862736cf8d110e6e5
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot the system after kernel update.
🔧 Temporary Workarounds
Disable IOMMU support
linuxDisable IOMMU subsystem to prevent the vulnerable code path from being executed
Add 'iommu=off' to kernel boot parameters in GRUB configuration
🧯 If You Can't Patch
- Implement strict access controls to limit local user privileges
- Monitor system logs for kernel crashes or memory corruption warnings
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with distribution's security advisory. Vulnerable if using kernel before fix commits.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits or check with 'uname -r' and compare against patched versions from your distribution.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN reports of use-after-free
- System crashes during device initialization
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
Search for kernel panic logs or KASAN error reports in system logs
🔗 References
- https://git.kernel.org/stable/c/65ab30f6a6952fa9ee13009862736cf8d110e6e5
- https://git.kernel.org/stable/c/b54240ad494300ff0994c4539a531727874381f4
- https://git.kernel.org/stable/c/cb86e511e78e796de6947b8f3acca1b7c76fb2ff
- https://git.kernel.org/stable/c/f74fc4b5bd533ea3d30ce47cccb8ef8d21fda85a
- https://git.kernel.org/stable/c/65ab30f6a6952fa9ee13009862736cf8d110e6e5
- https://git.kernel.org/stable/c/b54240ad494300ff0994c4539a531727874381f4
- https://git.kernel.org/stable/c/cb86e511e78e796de6947b8f3acca1b7c76fb2ff
- https://git.kernel.org/stable/c/f74fc4b5bd533ea3d30ce47cccb8ef8d21fda85a