CVE-2022-49094

7.1 HIGH

📋 TL;DR

This is a slab-out-of-bounds memory corruption vulnerability in the Linux kernel's TLS implementation. It allows attackers to potentially crash systems or execute arbitrary code by exploiting a buffer overflow during TLS decryption. Systems running vulnerable Linux kernel versions with TLS enabled are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when TLS kernel module is loaded and TLS connections are processed. Many distributions don't enable TLS by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data exfiltration, or persistent backdoor installation.

🟠

Likely Case

Kernel panic leading to denial of service, system crashes, or information disclosure through memory leaks.

🟢

If Mitigated

Limited impact if TLS is disabled or systems are properly segmented with network controls.

🌐 Internet-Facing: MEDIUM - Requires TLS connections to vulnerable systems, but many internet-facing services use TLS.
🏢 Internal Only: MEDIUM - Internal services using TLS could be exploited by authenticated attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to establish TLS connections to vulnerable system. Exploitation requires understanding of kernel memory layout and TLS protocol.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 2304660ab6c425df64d95301b601424c6a50f28b, 29be1816cbab9a0dc6243120939fd10a92753756, 2b7d14c105dd8f6412eda5a91e1e6154653731e3, 589154d0f18945f41d138a5b4e49e518d294474b, 6e2f1b033b17dedda51d465861b69e58317d6343

Vendor Advisory: https://git.kernel.org/stable/c/2304660ab6c425df64d95301b601424c6a50f28b

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable kernel TLS module

Linux

Unload the TLS kernel module to prevent exploitation

rmmod tls
echo 'blacklist tls' > /etc/modprobe.d/blacklist-tls.conf

Disable TLS 1.3

Linux

Configure systems to use TLS 1.2 or earlier to avoid the vulnerable code path

sysctl -w net.tls.tls13_enabled=0

🧯 If You Can't Patch

  • Implement network segmentation to restrict TLS connections to trusted sources only
  • Deploy host-based intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if TLS module is loaded: lsmod | grep tls. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update and confirm TLS module functions correctly with test connections.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN reports of slab-out-of-bounds
  • System crashes during TLS handshakes

Network Indicators:

  • Unusual TLS connection patterns to kernel ports
  • Malformed TLS packets targeting vulnerable systems

SIEM Query:

source="kernel" AND ("slab-out-of-bounds" OR "KASAN" OR "tls" AND "panic")

🔗 References

📤 Share & Export