CVE-2022-49948
📋 TL;DR
A Linux kernel vulnerability in the virtual terminal subsystem allows out-of-bounds memory access when changing console fonts. Attackers could potentially read or write kernel memory, leading to information disclosure or system crashes. This affects Linux systems with console access, particularly multi-user systems or those with physical access.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory corruption leading to privilege escalation, system crash, or information disclosure of sensitive kernel data.
Likely Case
System crash or denial of service due to invalid memory access, potentially causing kernel panic.
If Mitigated
Limited impact if console access is restricted and users cannot change fonts via KDFONTOP ioctl.
🎯 Exploit Status
Requires local access and ability to manipulate console font settings. Not trivial to weaponize for privilege escalation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in stable kernel releases via commits referenced in CVE
Vendor Advisory: https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.
🔧 Temporary Workarounds
Restrict console font changes
linuxPrevent users from changing console fonts via KDFONTOP ioctl
echo 'kernel.vt.allow_font_op = 0' >> /etc/sysctl.conf
sysctl -p
Disable virtual terminals
linuxRemove virtual terminal access for non-privileged users
chmod 620 /dev/tty*
setfacl -m u:root:rw /dev/tty*
🧯 If You Can't Patch
- Restrict physical and console access to trusted users only
- Implement strict access controls on /dev/tty devices and disable font operations via sysctl
🔍 How to Verify
Check if Vulnerable:
Check kernel version against distribution security advisories. Vulnerable if using unpatched kernel with console access enabled.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version matches patched release from vendor. Check that /proc/sys/kernel/vt/allow_font_op is 0 if workaround applied.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- OOM (out of memory) errors in dmesg
- Failed KDFONTOP ioctl attempts in audit logs
Network Indicators:
- None - local exploit only
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "general protection fault") AND process="console"
🔗 References
- https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285
- https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db
- https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f
- https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb
- https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a
- https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc
- https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e
- https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e