CVE-2022-49407

7.1 HIGH

📋 TL;DR

This CVE-2022-49407 is a memory corruption vulnerability in the Linux kernel's Distributed Lock Manager (DLM) component where improper casting between data structures leads to an out-of-bounds read. It affects Linux systems using DLM for cluster file system locking, potentially allowing local attackers to read kernel memory or cause denial of service. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if DLM module is loaded and used (typically in clustered environments like Red Hat Cluster Suite, Pacemaker, or GFS2 file systems).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level access, information disclosure of sensitive kernel memory, or system crash leading to denial of service.

🟠

Likely Case

Kernel panic or system crash causing denial of service, potentially disrupting clustered file systems and applications relying on DLM.

🟢

If Mitigated

Limited impact if DLM is not used or proper access controls prevent local exploitation.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from network.
🏢 Internal Only: MEDIUM - Local users or compromised accounts could exploit this to disrupt cluster operations or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of DLM operations. The KASAN report shows the exact code path but crafting a reliable exploit requires understanding of DLM internals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 2c55155cc365, 42252d0d2aa9, 49cd9eb7b9a7, 56aa8d1fbd02, 5a1765adf985

Vendor Advisory: https://git.kernel.org/stable/c/2c55155cc365861044d9e6e80e342693e8805e33

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable DLM module

Linux

Unload the DLM kernel module if not required for system operation

modprobe -r dlm

Blacklist DLM module

Linux

Prevent DLM module from loading at boot

echo 'blacklist dlm' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Restrict local user access to systems using DLM
  • Monitor for unusual DLM-related crashes or kernel panics

🔍 How to Verify

Check if Vulnerable:

Check if DLM module is loaded: lsmod | grep dlm. If loaded, check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and DLM module loads without errors in system logs.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN reports mentioning dlm or plock
  • System crashes during file locking operations

Network Indicators:

  • None - purely local exploitation

SIEM Query:

source="kernel" AND ("KASAN" OR "dlm" OR "plock") AND ("slab-out-of-bounds" OR "panic")

🔗 References

📤 Share & Export