CVE-2022-49044

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in the Linux kernel's dm-integrity subsystem allows attackers to write beyond allocated buffer boundaries when tag_size is configured smaller than the digest size. This can lead to kernel memory corruption and potential system compromise. Systems using dm-integrity with misconfigured tag_size parameters are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with dm-integrity support before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when dm-integrity is configured with tag_size parameter less than digest size. Not vulnerable in default configurations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to privilege escalation, denial of service, or arbitrary code execution in kernel context.

🟠

Likely Case

System crashes, kernel panics, or denial of service due to memory corruption.

🟢

If Mitigated

Limited impact if dm-integrity is not in use or properly configured with tag_size >= digest size.

🌐 Internet-Facing: LOW - Requires local access to configure dm-integrity devices.
🏢 Internal Only: MEDIUM - Local attackers with sufficient privileges to configure dm-integrity could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to configure dm-integrity devices. Exploitation depends on specific memory layout and configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 08c1af8f1c13, 4d485cf9b609, 6a95d91c0b31, 6b4bf97587ef, 7f84c9372229

Vendor Advisory: https://git.kernel.org/stable/c/08c1af8f1c13bbf210f1760132f4df24d0ed46d6

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Avoid misconfigured dm-integrity

all

Ensure tag_size parameter is not less than digest size when configuring dm-integrity devices

# When creating dm-integrity devices, ensure tag_size >= digest size
# Example: integritysetup format --tag-size=32 /dev/sdX

🧯 If You Can't Patch

  • Disable dm-integrity if not required for system functionality
  • Audit existing dm-integrity configurations to ensure tag_size >= digest size

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if dm-integrity is in use with potentially misconfigured tag_size

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and no dm-integrity devices have tag_size < digest size

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • System crash dumps
  • dm-integrity error messages

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic events or dm-integrity related crashes in system logs

🔗 References

📤 Share & Export