CVE-2022-49557

5.5 MEDIUM

📋 TL;DR

A memory corruption vulnerability in the Linux kernel's KVM subsystem allows out-of-bounds writes when handling FPU state for virtual machines. This affects systems running KVM virtualization on older CPUs without XSAVE support, potentially leading to kernel crashes or data corruption. The vulnerability is triggered during VM migration or FPU state operations.

💻 Affected Systems

Products:
  • Linux Kernel with KVM virtualization
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using KVM virtualization on CPUs without XSAVE support (e.g., Intel Core2 CPUs). Requires KVM to be enabled and in use.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel crash leading to host system instability, potential denial of service for all VMs on the host, or data corruption in kernel memory structures.

🟠

Likely Case

Kernel panic or system crash when migrating VMs between hosts with different CPU capabilities, particularly from newer to older hardware without XSAVE support.

🟢

If Mitigated

Minor performance impact from KASAN catching the out-of-bounds write, with system remaining operational but potentially logging warnings.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the host system and KVM privileges to trigger.
🏢 Internal Only: MEDIUM - Virtualization administrators and users with KVM access could trigger this during normal VM operations or migration tasks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires KVM access and specific conditions (migration between hosts with different CPU capabilities). The vulnerability was discovered through normal development/testing processes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 9cf15ebb7dedfe2f27120743b8ea8441c99ac73c, c181acbd1a427859d5fda543b95fbae28f7f6068, d187ba5312307d51818beafaad87d28a7d939adf

Vendor Advisory: https://git.kernel.org/stable/c/9cf15ebb7dedfe2f27120743b8ea8441c99ac73c

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for backported patches. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable KVM on affected hardware

linux

Prevent use of KVM virtualization on systems with CPUs lacking XSAVE support

modprobe -r kvm_intel
modprobe -r kvm_amd
echo 'blacklist kvm' >> /etc/modprobe.d/blacklist.conf

Avoid VM migration to older hardware

linux

Prevent migrating virtual machines to hosts with CPUs that don't support XSAVE

🧯 If You Can't Patch

  • Avoid migrating VMs between hosts with different CPU capabilities
  • Disable KVM virtualization on systems with Core2 or other non-XSAVE CPUs

🔍 How to Verify

Check if Vulnerable:

Check kernel version and CPU capabilities: uname -r and grep xsave /proc/cpuinfo

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check with distribution's security update status

📡 Detection & Monitoring

Log Indicators:

  • KASAN reports of slab-out-of-bounds writes
  • Kernel panic messages related to FPU or KVM
  • Warnings about FPU state corruption

Network Indicators:

  • Unusual VM migration failures

SIEM Query:

kernel:("KASAN: slab-out-of-bounds" OR "fpu_copy_uabi_to_guest_fpstate") OR kvm:("FPU" OR "migration failure")

🔗 References

📤 Share & Export