CVE-2022-49395

7.1 HIGH

📋 TL;DR

This is an out-of-bounds read vulnerability in the Linux kernel's User Mode Linux (UML) subsystem. It occurs when setting up Local Descriptor Table (LDT) entries due to incorrect parameter handling in syscall_stub_data(), potentially allowing kernel memory disclosure. Only systems running User Mode Linux are affected.

💻 Affected Systems

Products:
  • Linux kernel with User Mode Linux (UML) support
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with UML enabled
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if UML is compiled/enabled and used. Most standard Linux distributions do not enable UML by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leakage, which could be chained with other vulnerabilities for privilege escalation or system compromise.

🟠

Likely Case

Kernel crash or denial of service due to invalid memory access, potentially causing system instability.

🟢

If Mitigated

No impact if UML is not used or the system is patched.

🌐 Internet-Facing: LOW - UML is typically used for development/testing, not production internet-facing systems.
🏢 Internal Only: LOW - UML is a specialized virtualization environment not commonly deployed in enterprise production environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires UML environment and knowledge of kernel internals. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel stable releases via commits referenced in CVE

Vendor Advisory: https://git.kernel.org/stable/c/10995a382271254bd276627ec74136da4a23c4a6

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable UML

all

Disable User Mode Linux support in kernel configuration

Ensure CONFIG_UML is not set in kernel configuration

🧯 If You Can't Patch

  • Disable UML kernel module if loaded
  • Avoid using User Mode Linux environments

🔍 How to Verify

Check if Vulnerable:

Check if UML is enabled and kernel version is before fix. Run: grep CONFIG_UML /boot/config-$(uname -r) && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits and UML is either disabled or patched

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN stack-out-of-bounds reports in dmesg
  • UML process crashes

Network Indicators:

  • None specific - local vulnerability

SIEM Query:

Search for 'KASAN: stack-out-of-bounds' or 'syscall_stub_data' in kernel logs

🔗 References

📤 Share & Export