CVE-2022-50482

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's Intel VT-d (Virtualization Technology for Directed I/O) subsystem. When the init_dmars() function fails during system initialization, it doesn't properly clean up the si_domain memory allocation, potentially leading to kernel memory exhaustion. This affects systems using Intel VT-d hardware virtualization with affected Linux kernel versions.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated, but references indicate fixes in stable kernel trees. Likely affects versions before the referenced commits.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel VT-d hardware virtualization enabled and using the affected kernel code paths.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory exhaustion leading to system instability, crashes, or denial of service conditions that could disrupt virtualization environments and hosted workloads.

🟠

Likely Case

Memory leak causing gradual performance degradation over time, potentially requiring system reboots to clear accumulated memory allocations.

🟢

If Mitigated

Minimal impact as the leak occurs only during initialization failures, which are rare in stable systems.

🌐 Internet-Facing: LOW - This is a kernel-level vulnerability requiring local access or ability to trigger VT-d initialization failures.
🏢 Internal Only: MEDIUM - Could affect virtualization hosts and systems with VT-d enabled, potentially disrupting internal services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires triggering specific VT-d initialization failures, which is complex and requires privileged access or specific hardware conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions containing commits: 0365d6af75f9f2696e94a0fef24a2c8464c037c8, 5cecfe151874b835331efe086bbdcaeaf64f6b90, 620bf9f981365c18cc2766c53d92bf8131c63f32, 724483b585a1b1e063d42ac5aa835707ff2ec165, 749bea542b67513e99240dc58bbfc099e842d508

Vendor Advisory: https://git.kernel.org/stable/c/

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable Intel VT-d

linux

Disable VT-d hardware virtualization if not required, preventing the vulnerable code path from being executed.

Add 'intel_iommu=off' to kernel boot parameters in /etc/default/grub or bootloader configuration

🧯 If You Can't Patch

  • Monitor system memory usage for unusual growth patterns
  • Implement regular system reboots to clear potential memory accumulation

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if VT-d is enabled: 'uname -r' and 'dmesg | grep -i iommu'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains fix commits: 'uname -r' and check distribution patch notes

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • Memory allocation failures in dmesg
  • VT-d initialization error messages

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

Search for kernel panic logs, memory allocation failures, or VT-d related errors in system logs

🔗 References

📤 Share & Export