Skip to main content

CVE-2022-48764: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48764cvecve-2022-48764
Published: Thu Jun 20 2024 (06/20/2024, 11:13:41 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2} Free the "struct kvm_cpuid_entry2" array on successful post-KVM_RUN KVM_SET_CPUID{,2} to fix a memory leak, the callers of kvm_set_cpuid() free the array only on failure. BUG: memory leak unreferenced object 0xffff88810963a800 (size 2048): comm "syz-executor025", pid 3610, jiffies 4294944928 (age 8.080s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 00 00 ................ 47 65 6e 75 6e 74 65 6c 69 6e 65 49 00 00 00 00 GenuntelineI.... backtrace: [<ffffffff814948ee>] kmalloc_node include/linux/slab.h:604 [inline] [<ffffffff814948ee>] kvmalloc_node+0x3e/0x100 mm/util.c:580 [<ffffffff814950f2>] kvmalloc include/linux/slab.h:732 [inline] [<ffffffff814950f2>] vmemdup_user+0x22/0x100 mm/util.c:199 [<ffffffff8109f5ff>] kvm_vcpu_ioctl_set_cpuid2+0x8f/0xf0 arch/x86/kvm/cpuid.c:423 [<ffffffff810711b9>] kvm_arch_vcpu_ioctl+0xb99/0x1e60 arch/x86/kvm/x86.c:5251 [<ffffffff8103e92d>] kvm_vcpu_ioctl+0x4ad/0x950 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4066 [<ffffffff815afacc>] vfs_ioctl fs/ioctl.c:51 [inline] [<ffffffff815afacc>] __do_sys_ioctl fs/ioctl.c:874 [inline] [<ffffffff815afacc>] __se_sys_ioctl fs/ioctl.c:860 [inline] [<ffffffff815afacc>] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:860 [<ffffffff844a3335>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff844a3335>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

AI-Powered Analysis

AILast updated: 06/30/2025, 20:55:24 UTC

Technical Analysis

CVE-2022-48764 is a medium-severity vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically affecting the x86 architecture. The issue arises from improper memory management related to the handling of the kvm_cpuid_entry2 array during the execution of KVM_SET_CPUID and KVM_SET_CPUID2 ioctls. These ioctls are used to set the CPUID entries for virtual CPUs. The vulnerability manifests as a memory leak because the array is only freed on failure cases but not after successful KVM_RUN operations, leading to unreferenced memory objects accumulating over time. The technical details include a kernel backtrace showing the allocation and failure to free memory in functions such as kvmalloc_node, vmemdup_user, and kvm_vcpu_ioctl_set_cpuid2. The leak can be triggered by processes interacting with KVM ioctls, such as fuzzing tools (e.g., syz-executor), which repeatedly invoke these calls. While this vulnerability does not directly allow code execution or privilege escalation, the leak can degrade system performance and stability, potentially leading to denial of service (DoS) conditions in environments heavily utilizing KVM virtualization. The CVSS v3.1 score is 5.3 (medium), reflecting local attack vector with low complexity, requiring privileges but no user interaction, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations, the impact of CVE-2022-48764 primarily concerns environments that rely heavily on Linux-based virtualization infrastructure, such as cloud service providers, data centers, and enterprises using KVM for virtual machine management. Memory leaks in kernel components can lead to resource exhaustion, causing degraded performance or crashes of host systems running multiple virtual machines. This can disrupt critical services, especially in sectors like finance, telecommunications, and government, where uptime and reliability are paramount. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting instability could be exploited as part of a broader attack chain or cause operational disruptions. Organizations with large-scale virtualization deployments or those running multi-tenant environments are at higher risk. Additionally, the requirement for local privileges to exploit the vulnerability means that attackers would need some level of access already, emphasizing the importance of internal security controls.

Mitigation Recommendations

To mitigate CVE-2022-48764, European organizations should: 1) Apply the latest Linux kernel patches that address this memory leak as soon as they become available, ensuring that all KVM-related kernel components are updated. 2) Implement strict access controls and monitoring on systems running KVM to prevent unauthorized local access, including limiting who can interact with KVM ioctls. 3) Employ resource monitoring tools to detect unusual memory consumption patterns that may indicate exploitation attempts or memory leaks. 4) Use security-hardened configurations for virtualization hosts, such as SELinux or AppArmor policies, to restrict the capabilities of processes interacting with KVM. 5) Regularly audit and update virtualization management tools and fuzzing utilities to avoid triggering the vulnerability inadvertently. 6) Consider isolating critical virtual machines on separate hosts to minimize the impact of potential host instability. These measures go beyond generic advice by focusing on kernel patching, access restriction, and proactive resource monitoring tailored to KVM environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-20T11:09:39.060Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe60e2

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 8:55:24 PM

Last updated: 7/29/2025, 1:27:52 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats