CVE-2022-49973
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's sk_msg_recvmsg() function can cause kernel crashes when handling socket redirection via sockmap. This affects Linux systems using BPF sockmap redirection without stream parsers/verdicts. Attackers with local access can trigger denial of service.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially disrupting critical services.
Likely Case
Local denial of service through kernel crash, requiring system reboot to recover.
If Mitigated
Minimal impact if systems are patched or don't use affected BPF sockmap configurations.
🎯 Exploit Status
Requires local access and ability to trigger specific BPF sockmap operations. No public exploit code identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in stable kernel trees via referenced commits
Vendor Advisory: https://git.kernel.org/stable/c/10ee118a1756141f8e9c87aa7344ed12b41630a8
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing fixes 2. Reboot system 3. Verify kernel version after reboot
🔧 Temporary Workarounds
Disable BPF sockmap redirection
linuxPrevent use of vulnerable BPF sockmap functionality
sysctl -w net.core.bpf_jit_enable=0
Remove BPF programs using sockmap redirection
🧯 If You Can't Patch
- Restrict local user access to prevent exploitation
- Monitor for kernel panic/crash events and investigate root causes
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if sockmap BPF programs are in use: uname -r and bpftool prog list
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and no crashes occur during sockmap operations
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NULL pointer dereference in sk_msg_recvmsg
- System crash/reboot events
Network Indicators:
- Unusual BPF program activity
SIEM Query:
search 'kernel panic' OR 'NULL pointer dereference' AND 'sk_msg_recvmsg'