Skip to main content

CVE-2022-3107: CWE-476 in Kernel

Medium
VulnerabilityCVE-2022-3107cvecve-2022-3107cwe-476
Published: Wed Dec 14 2022 (12/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Kernel

Description

An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.

AI-Powered Analysis

AILast updated: 06/21/2025, 18:06:09 UTC

Technical Analysis

CVE-2022-3107 is a medium-severity vulnerability identified in the Linux kernel version 5.16-rc6, specifically within the Hyper-V network driver component (netvsc). The issue arises in the function netvsc_get_ethtool_stats located in drivers/net/hyperv/netvsc_drv.c. This function calls kvmalloc_array() to allocate memory but fails to verify the return value before use. If kvmalloc_array() returns NULL due to memory allocation failure, the subsequent dereference of this null pointer leads to a kernel NULL pointer dereference (CWE-476). This results in a denial of service (DoS) condition by crashing the kernel or causing a system panic. The vulnerability requires local privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the affected system to exploit this flaw. The vulnerability does not impact confidentiality or integrity but affects availability by causing system crashes. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though it is likely that kernel maintainers have addressed this issue in subsequent releases. The vulnerability is specific to Linux kernel 5.16-rc6, a release candidate version, which may limit exposure to production environments but remains relevant for organizations running this or closely related kernel versions, especially in virtualized environments using Hyper-V drivers.

Potential Impact

For European organizations, the primary impact of CVE-2022-3107 is the potential for local denial of service on Linux systems running the affected kernel version, particularly those utilizing Hyper-V virtualization infrastructure. This could disrupt critical services, especially in data centers or cloud environments where Linux virtual machines are hosted on Hyper-V hypervisors. Although the vulnerability does not allow privilege escalation or data compromise, the availability impact could lead to operational downtime, affecting business continuity. Organizations relying on Linux 5.16-rc6 kernels in production or testing environments may experience unexpected system crashes, which could complicate incident response and recovery efforts. Given the medium CVSS score (5.5) and local attack vector, the threat is moderate but should not be ignored, especially in sectors with stringent uptime requirements such as finance, healthcare, and critical infrastructure within Europe.

Mitigation Recommendations

Upgrade Linux kernels from 5.16-rc6 to a stable, patched version where this vulnerability is resolved. Avoid using release candidate kernels in production environments. Implement strict kernel version control and patch management policies to ensure vulnerable kernel versions are not deployed or are promptly updated. For systems running Hyper-V virtualized Linux instances, monitor kernel logs for null pointer dereference or crash events that may indicate exploitation attempts or triggering of this vulnerability. Limit local user privileges and access to systems running affected kernels to reduce the risk of local exploitation. Employ memory resource monitoring and allocation limits to reduce the likelihood of kvmalloc_array() failing due to memory exhaustion. Consider deploying kernel hardening features such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to mitigate exploitation impact. Engage with Linux distribution vendors and apply official security patches as they become available, even if the affected kernel is not the default in the distribution. In virtualized environments, ensure hypervisor and guest integration components are up to date to avoid indirect exploitation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf74e1

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 6:06:09 PM

Last updated: 8/9/2025, 11:11:20 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats