CVE-2022-49801

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's tracing subsystem, specifically in the tracing_read_pipe() function. The vulnerability allows unprivileged local users to cause a kernel memory leak by reading from trace pipes, potentially leading to denial of service through resource exhaustion. All Linux systems with the affected kernel versions are vulnerable.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific affected versions not explicitly stated in CVE description; typically affects multiple kernel versions before the fix commits listed in references
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires the tracing subsystem to be enabled and accessible; some distributions may restrict trace pipe access by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could repeatedly trigger the memory leak to exhaust kernel memory, causing system instability, crashes, or denial of service affecting all users and services on the system.

🟠

Likely Case

Local users could cause gradual memory consumption leading to performance degradation or system instability over time, particularly on systems with frequent tracing operations.

🟢

If Mitigated

With proper access controls limiting trace pipe access to privileged users only, the impact is minimal as only authorized users could trigger the vulnerability.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system; it cannot be exploited remotely over the network.
🏢 Internal Only: MEDIUM - Local users (including compromised accounts or malicious insiders) can exploit this to degrade system performance or cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation requires only reading from trace pipes, which is straightforward for local users with access.

Exploitation requires local access to the system; the vulnerability is in a core kernel component but has limited impact scope (memory leak rather than code execution).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 2c21ee020ce43d744ecd7f3e9bddfcaafef270ce, 649e72070cbbb8600eb823833e4748f5a0815116, a7d3f8f33c113478737bc61bb32ec5f9a987da7d

Vendor Advisory: https://git.kernel.org/stable/c/2c21ee020ce43d744ecd7f3e9bddfcaafef270ce

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your Linux distribution vendor. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version or testing the vulnerability.

🔧 Temporary Workarounds

Restrict trace pipe access

linux

Limit access to trace pipes to privileged users only to prevent unprivileged exploitation

chmod 600 /sys/kernel/debug/tracing/trace_pipe
echo 1 > /proc/sys/kernel/perf_event_paranoid

Disable tracing subsystem

linux

Completely disable kernel tracing if not required

echo 0 > /sys/kernel/debug/tracing/tracing_on
echo nop > /sys/kernel/debug/tracing/current_tracer

🧯 If You Can't Patch

  • Implement strict access controls on /sys/kernel/debug/tracing to limit access to trusted administrators only
  • Monitor system memory usage and kernel logs for signs of memory exhaustion or repeated trace pipe access attempts

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with patched versions from your distribution; test by reading from trace pipes while monitoring memory usage

Check Version:

uname -r

Verify Fix Applied:

After patching, verify the kernel version includes the fix commits; test that reading from trace pipes no longer causes memory leaks

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • High memory usage in kernel space
  • Frequent access to trace pipes in audit logs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Process monitoring for repeated reads from /sys/kernel/debug/tracing/trace_pipe combined with memory consumption alerts

🔗 References

📤 Share & Export