CVE-2022-49223

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's CXL (Compute Express Link) subsystem where a decoder object can reference a freed parent port object during cleanup. It affects Linux systems with CXL hardware support and can lead to kernel crashes or potential privilege escalation. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions with CXL support before the fix commits. Specifically affects versions where the vulnerable code was introduced up to the patched versions.
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with CXL hardware support enabled in the kernel. Most cloud/VM environments are unaffected unless specifically using CXL devices.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation to root if an attacker can manipulate the freed memory region.

🟠

Likely Case

Kernel crash causing system instability or denial of service, requiring reboot to recover.

🟢

If Mitigated

Limited impact if system has proper access controls preventing unprivileged users from triggering CXL operations.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring access to the system.
🏢 Internal Only: MEDIUM - Internal users with shell access could potentially crash systems or escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of CXL subsystem operations. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 49f2dab77a5e, 518bb9636712, 74be98774dfb, b0022ca445d5

Vendor Advisory: https://git.kernel.org/stable/c/49f2dab77a5e1354f5da6ccdc9346a8212697be2

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable CXL support

Linux

Remove CXL module loading or disable CXL hardware support in kernel configuration

echo 'blacklist cxl_core' > /etc/modprobe.d/blacklist-cxl.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict user access to prevent local exploitation
  • Implement strict privilege separation and limit users who can interact with CXL devices

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if CXL modules are loaded: 'lsmod | grep cxl' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits and CXL modules load without errors in dmesg

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN reports of use-after-free in cxl_decoder_release
  • System crashes or unexpected reboots

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

search 'cxl_decoder_release' OR 'KASAN: use-after-free' in kernel logs

🔗 References

📤 Share & Export