CVE-2022-49710
📋 TL;DR
This CVE describes a memory access vulnerability in the Linux kernel's device mapper mirror logging subsystem. On 64-bit systems, the code could read up to 4 bytes beyond allocated memory boundaries, potentially causing kernel crashes or information disclosure. Systems running affected Linux kernel versions with device mapper mirroring configured are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, or potential information disclosure from kernel memory.
Likely Case
System instability or crashes when device mapper mirroring operations are performed, particularly under heavy I/O load.
If Mitigated
Minimal impact if device mapper mirroring is not in use or if systems are patched.
🎯 Exploit Status
Discovered through kasan testing in lvm2 testsuite. Exploitation requires local access and specific conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 0d2209b54f1de0c2f99cab246d4cf2cfe24aaaa9, 85e123c27d5cbc22cfdc01de1e2ca1d9003a02d0, 9a02f3275acc628c0d956be771405ced79ac36df, ae460312875159285cef5bf3dc654593f404a1ef, ba751f0d25f07aa21ce9b85372a3792bf7969d13
Vendor Advisory: https://git.kernel.org/stable/c/0d2209b54f1de0c2f99cab246d4cf2cfe24aaaa9
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable device mapper mirroring
linuxIf not required, disable or remove device mapper mirror configurations.
# Check for dm-mirror usage: dmsetup table
# Remove mirror targets if found: dmsetup remove <target_name>
🧯 If You Can't Patch
- Avoid using device mapper mirroring functionality
- Monitor systems for kernel panics or instability related to storage operations
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if device mapper mirroring is configured: dmsetup table | grep mirror
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version contains fix commits and test with lvm2 testsuite kasan checks.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- Oops messages in /var/log/kern.log or dmesg
- Storage subsystem errors
Network Indicators:
- None - this is a local kernel vulnerability
SIEM Query:
Search for kernel panic or Oops messages in system logs
🔗 References
- https://git.kernel.org/stable/c/0d2209b54f1de0c2f99cab246d4cf2cfe24aaaa9
- https://git.kernel.org/stable/c/85e123c27d5cbc22cfdc01de1e2ca1d9003a02d0
- https://git.kernel.org/stable/c/9a02f3275acc628c0d956be771405ced79ac36df
- https://git.kernel.org/stable/c/ae460312875159285cef5bf3dc654593f404a1ef
- https://git.kernel.org/stable/c/ba751f0d25f07aa21ce9b85372a3792bf7969d13