Skip to main content

CVE-2022-49395: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49395cvecve-2022-49395
Published: Wed Feb 26 2025 (02/26/2025, 02:11:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: um: Fix out-of-bounds read in LDT setup syscall_stub_data() expects the data_count parameter to be the number of longs, not bytes. ================================================================== BUG: KASAN: stack-out-of-bounds in syscall_stub_data+0x70/0xe0 Read of size 128 at addr 000000006411f6f0 by task swapper/1 CPU: 0 PID: 1 Comm: swapper Not tainted 5.18.0+ #18 Call Trace: show_stack.cold+0x166/0x2a7 __dump_stack+0x3a/0x43 dump_stack_lvl+0x1f/0x27 print_report.cold+0xdb/0xf81 kasan_report+0x119/0x1f0 kasan_check_range+0x3a3/0x440 memcpy+0x52/0x140 syscall_stub_data+0x70/0xe0 write_ldt_entry+0xac/0x190 init_new_ldt+0x515/0x960 init_new_context+0x2c4/0x4d0 mm_init.constprop.0+0x5ed/0x760 mm_alloc+0x118/0x170 0x60033f48 do_one_initcall+0x1d7/0x860 0x60003e7b kernel_init+0x6e/0x3d4 new_thread_handler+0x1e7/0x2c0 The buggy address belongs to stack of task swapper/1 and is located at offset 64 in frame: init_new_ldt+0x0/0x960 This frame has 2 objects: [32, 40) 'addr' [64, 80) 'desc' ==================================================================

AI-Powered Analysis

AILast updated: 06/30/2025, 06:42:57 UTC

Technical Analysis

CVE-2022-49395 is a vulnerability identified in the Linux kernel, specifically related to an out-of-bounds read error in the setup of the Local Descriptor Table (LDT). The issue arises in the syscall_stub_data() function, which incorrectly interprets the data_count parameter as the number of bytes rather than the number of longs, leading to a stack-based out-of-bounds read. This flaw was detected by the Kernel Address Sanitizer (KASAN) during the initialization of new LDT entries, causing a read of 128 bytes beyond the intended stack buffer. The vulnerability is rooted in the improper handling of memory boundaries during the LDT setup, which is a critical component in managing segment descriptors for processes. The bug manifests during kernel initialization and context setup, as indicated by the stack trace involving functions like init_new_ldt and init_new_context. Although the vulnerability results in an out-of-bounds read rather than a write, it can potentially lead to information disclosure or kernel instability. The affected versions are specific Linux kernel commits identified by their hashes, and the vulnerability was published on February 26, 2025. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2022-49395 depends on their reliance on affected Linux kernel versions, particularly in environments where kernel initialization and context switching are critical, such as servers, cloud infrastructure, and embedded systems. The out-of-bounds read could potentially expose sensitive kernel stack data, leading to information leakage that attackers might leverage for privilege escalation or further exploitation. Additionally, the instability caused by such memory errors could result in system crashes or denial of service, affecting availability. Organizations running customized or older Linux kernels that include the vulnerable commits are at higher risk. Given the Linux kernel's widespread use across European enterprises, cloud providers, and public sector infrastructure, this vulnerability could affect a broad range of systems if unpatched. However, the lack of known exploits and the complexity of triggering this bug during kernel initialization somewhat limit immediate risk. Still, the potential for exploitation in targeted attacks or as part of a multi-stage attack chain remains a concern.

Mitigation Recommendations

To mitigate CVE-2022-49395, European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability involves kernel initialization code, ensuring that all kernel updates from trusted sources are applied promptly is critical. Organizations should audit their systems to identify Linux kernel versions matching the affected commits and schedule immediate upgrades. For environments where kernel updates are challenging, such as embedded devices, consider applying vendor-provided patches or recompiling kernels with the fix. Additionally, enabling Kernel Address Sanitizer (KASAN) in test environments can help detect similar memory issues proactively. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable systems. Monitoring kernel logs for unusual crashes or KASAN reports can provide early warning signs of exploitation attempts. Finally, organizations should maintain robust incident response plans to address potential kernel-level compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.562Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe58b4

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 6:42:57 AM

Last updated: 8/17/2025, 2:16:27 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats