CVE-2022-48912
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's netfilter subsystem that allows local attackers to potentially escalate privileges or cause denial of service. The vulnerability occurs when registering netfilter hooks, where freed memory can be accessed after mutex release. Systems running affected Linux kernel versions are vulnerable.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to root, kernel panic causing system crash, or arbitrary code execution in kernel context.
Likely Case
Kernel panic leading to denial of service or local privilege escalation if combined with other vulnerabilities.
If Mitigated
System crash requiring reboot, but no remote exploitation possible.
🎯 Exploit Status
Exploitation requires local access and knowledge of kernel memory layout. The vulnerability was discovered through syzkaller fuzzing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 05f7927b25d2635e87267ff6c79db79fb46cf313 and related commits
Vendor Advisory: https://git.kernel.org/stable/c/05f7927b25d2635e87267ff6c79db79fb46cf313
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commit. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable netfilter modules
linuxRemove or blacklist netfilter modules to prevent hook registration
modprobe -r nf_synproxy_ipv6
echo 'blacklist nf_synproxy_ipv6' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Restrict local user access to prevent exploitation
- Implement strict SELinux/AppArmor policies to limit kernel access
🔍 How to Verify
Check if Vulnerable:
Check kernel version: uname -r and compare with distribution's patched version list
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update and check that the fix commit is present in kernel source
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- KASAN reports of use-after-free in netfilter
- System crashes during netfilter operations
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
source="kernel" AND ("KASAN: use-after-free" OR "netfilter" AND "panic")
🔗 References
- https://git.kernel.org/stable/c/05f7927b25d2635e87267ff6c79db79fb46cf313
- https://git.kernel.org/stable/c/49c24579cec41e32f13d57b337fd28fb208d4a5b
- https://git.kernel.org/stable/c/56763f12b0f02706576a088e85ef856deacc98a0
- https://git.kernel.org/stable/c/5a8076e98dde17224dd47283b894a8b1dbe1bc72
- https://git.kernel.org/stable/c/8b0142c4143c1ca297dcf2c0cdd045d65dae2344
- https://git.kernel.org/stable/c/bd61f192a339b1095dfd6d56073a5265934c2979
- https://git.kernel.org/stable/c/bdd8fc1b826e6f23963f5bef3f7431c6188ec954