Skip to main content

CVE-2022-49078: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49078cvecve-2022-49078
Published: Wed Feb 26 2025 (02/26/2025, 01:54:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: lz4: fix LZ4_decompress_safe_partial read out of bound When partialDecoding, it is EOF if we've either filled the output buffer or can't proceed with reading an offset for following match. In some extreme corner cases when compressed data is suitably corrupted, UAF will occur. As reported by KASAN [1], LZ4_decompress_safe_partial may lead to read out of bound problem during decoding. lz4 upstream has fixed it [2] and this issue has been disscussed here [3] before. current decompression routine was ported from lz4 v1.8.3, bumping lib/lz4 to v1.9.+ is certainly a huge work to be done later, so, we'd better fix it first. [1] https://lore.kernel.org/all/000000000000830d1205cf7f0477@google.com/ [2] https://github.com/lz4/lz4/commit/c5d6f8a8be3927c0bec91bcc58667a6cfad244ad# [3] https://lore.kernel.org/all/CC666AE8-4CA4-4951-B6FB-A2EFDE3AC03B@fb.com/

AI-Powered Analysis

AILast updated: 07/03/2025, 03:26:53 UTC

Technical Analysis

CVE-2022-49078 is a high-severity vulnerability in the Linux kernel's implementation of the LZ4 decompression algorithm. Specifically, the issue arises in the function LZ4_decompress_safe_partial, which is responsible for decompressing data streams partially. The vulnerability is a use-after-free (UAF) condition triggered by a read out-of-bounds during decompression when processing corrupted compressed data. This occurs in rare corner cases where the decompression routine attempts to read an offset for a subsequent match but fails due to corrupted input, leading to an out-of-bounds read. The root cause stems from the Linux kernel using an older version of the LZ4 library (v1.8.3) and not yet upgrading to the fixed upstream version (v1.9+). The LZ4 upstream project has addressed this issue, and the Linux kernel maintainers have applied a fix to mitigate the problem temporarily. The vulnerability is classified under CWE-416 (Use After Free), which can lead to arbitrary code execution, denial of service, or system crashes if exploited. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability poses a significant risk due to its potential impact on core Linux kernel functionality and the widespread use of LZ4 compression in various subsystems and applications.

Potential Impact

For European organizations, the impact of CVE-2022-49078 can be substantial. Linux is widely deployed across enterprise servers, cloud infrastructure, embedded systems, and critical infrastructure within Europe. The vulnerability could allow a local attacker with limited privileges to escalate their capabilities, execute arbitrary code within the kernel context, or cause system crashes leading to denial of service. This is particularly concerning for sectors relying heavily on Linux-based systems such as finance, telecommunications, government, and manufacturing. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or corrupted, and critical services disrupted. Additionally, since LZ4 compression is used in various Linux kernel components and user-space applications, the attack surface is broad. Although exploitation requires local access, insider threats or compromised user accounts could leverage this vulnerability to gain kernel-level control, undermining system security and trust. The absence of known exploits in the wild provides a window for proactive mitigation, but the risk remains high due to the severity and potential consequences.

Mitigation Recommendations

European organizations should prioritize patching Linux kernel versions affected by CVE-2022-49078 as soon as vendor updates become available. Since the vulnerability stems from an outdated LZ4 library version, upgrading to the fixed LZ4 version (v1.9+) integrated into the kernel is essential. In the interim, organizations should audit and restrict local user privileges to minimize the risk of exploitation by low-privileged users. Employing kernel hardening techniques such as SELinux or AppArmor can help contain potential exploitation attempts. Monitoring system logs for unusual decompression errors or crashes related to LZ4 can provide early detection of exploitation attempts. For environments where patching is delayed, consider isolating critical Linux systems and limiting access to trusted users only. Additionally, organizations should review and update incident response plans to include scenarios involving kernel-level compromises. Coordination with Linux distribution vendors and subscribing to security advisories will ensure timely awareness of patches and mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.247Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6aa6

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/3/2025, 3:26:53 AM

Last updated: 8/7/2025, 10:33:22 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats