CVE-2022-49078
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's LZ4 decompression function (LZ4_decompress_safe_partial) allows reading out of bounds when processing specially crafted corrupted data. This can lead to kernel memory corruption, crashes, or potential privilege escalation. All Linux systems using affected kernel versions with LZ4 compression support are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, or potential privilege escalation to kernel mode allowing full system compromise.
Likely Case
Kernel crash causing system instability or denial of service.
If Mitigated
System remains stable with proper kernel hardening and isolation preventing escalation.
🎯 Exploit Status
Exploitation requires ability to trigger LZ4 decompression with malicious data. No public exploit code available at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commits: 467d5e200ab4486b744fe1776154a43d1aa22d4b, 6adc01a7aa37445dafe8846faa0610a86029b253, 73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3, 9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927, e64dbe97c05c769525cbca099ddbd22485630235
Vendor Advisory: https://git.kernel.org/stable/c/467d5e200ab4486b744fe1776154a43d1aa22d4b
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable LZ4 compression
allDisable LZ4 compression in system configurations where possible to reduce attack surface
Check system documentation for LZ4 configuration options
🧯 If You Can't Patch
- Implement strict input validation for any user-controlled data that triggers LZ4 decompression
- Isolate systems using LZ4 compression behind network segmentation and strict access controls
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with distribution's security advisories. Run: uname -r
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched version from vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- System crash logs
- OOM killer activity related to kernel memory
Network Indicators:
- Unusual network traffic patterns to services using LZ4 compression
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "general protection fault") AND process="kernel"
🔗 References
- https://git.kernel.org/stable/c/467d5e200ab4486b744fe1776154a43d1aa22d4b
- https://git.kernel.org/stable/c/6adc01a7aa37445dafe8846faa0610a86029b253
- https://git.kernel.org/stable/c/73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3
- https://git.kernel.org/stable/c/9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927
- https://git.kernel.org/stable/c/e64dbe97c05c769525cbca099ddbd22485630235
- https://git.kernel.org/stable/c/eafc0a02391b7b36617b36c97c4b5d6832cf5e24