CVE-2022-49395: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: um: Fix out-of-bounds read in LDT setup syscall_stub_data() expects the data_count parameter to be the number of longs, not bytes. ================================================================== BUG: KASAN: stack-out-of-bounds in syscall_stub_data+0x70/0xe0 Read of size 128 at addr 000000006411f6f0 by task swapper/1 CPU: 0 PID: 1 Comm: swapper Not tainted 5.18.0+ #18 Call Trace: show_stack.cold+0x166/0x2a7 __dump_stack+0x3a/0x43 dump_stack_lvl+0x1f/0x27 print_report.cold+0xdb/0xf81 kasan_report+0x119/0x1f0 kasan_check_range+0x3a3/0x440 memcpy+0x52/0x140 syscall_stub_data+0x70/0xe0 write_ldt_entry+0xac/0x190 init_new_ldt+0x515/0x960 init_new_context+0x2c4/0x4d0 mm_init.constprop.0+0x5ed/0x760 mm_alloc+0x118/0x170 0x60033f48 do_one_initcall+0x1d7/0x860 0x60003e7b kernel_init+0x6e/0x3d4 new_thread_handler+0x1e7/0x2c0 The buggy address belongs to stack of task swapper/1 and is located at offset 64 in frame: init_new_ldt+0x0/0x960 This frame has 2 objects: [32, 40) 'addr' [64, 80) 'desc' ==================================================================
AI Analysis
Technical Summary
CVE-2022-49395 is a vulnerability identified in the Linux kernel, specifically related to an out-of-bounds read error in the setup of the Local Descriptor Table (LDT). The issue arises in the syscall_stub_data() function, which incorrectly interprets the data_count parameter as the number of bytes rather than the number of longs, leading to a stack-based out-of-bounds read. This flaw was detected by the Kernel Address Sanitizer (KASAN) during the initialization of new LDT entries, causing a read of 128 bytes beyond the intended stack buffer. The vulnerability is rooted in the improper handling of memory boundaries during the LDT setup, which is a critical component in managing segment descriptors for processes. The bug manifests during kernel initialization and context setup, as indicated by the stack trace involving functions like init_new_ldt and init_new_context. Although the vulnerability results in an out-of-bounds read rather than a write, it can potentially lead to information disclosure or kernel instability. The affected versions are specific Linux kernel commits identified by their hashes, and the vulnerability was published on February 26, 2025. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-49395 depends on their reliance on affected Linux kernel versions, particularly in environments where kernel initialization and context switching are critical, such as servers, cloud infrastructure, and embedded systems. The out-of-bounds read could potentially expose sensitive kernel stack data, leading to information leakage that attackers might leverage for privilege escalation or further exploitation. Additionally, the instability caused by such memory errors could result in system crashes or denial of service, affecting availability. Organizations running customized or older Linux kernels that include the vulnerable commits are at higher risk. Given the Linux kernel's widespread use across European enterprises, cloud providers, and public sector infrastructure, this vulnerability could affect a broad range of systems if unpatched. However, the lack of known exploits and the complexity of triggering this bug during kernel initialization somewhat limit immediate risk. Still, the potential for exploitation in targeted attacks or as part of a multi-stage attack chain remains a concern.
Mitigation Recommendations
To mitigate CVE-2022-49395, European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability involves kernel initialization code, ensuring that all kernel updates from trusted sources are applied promptly is critical. Organizations should audit their systems to identify Linux kernel versions matching the affected commits and schedule immediate upgrades. For environments where kernel updates are challenging, such as embedded devices, consider applying vendor-provided patches or recompiling kernels with the fix. Additionally, enabling Kernel Address Sanitizer (KASAN) in test environments can help detect similar memory issues proactively. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable systems. Monitoring kernel logs for unusual crashes or KASAN reports can provide early warning signs of exploitation attempts. Finally, organizations should maintain robust incident response plans to address potential kernel-level compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2022-49395: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: um: Fix out-of-bounds read in LDT setup syscall_stub_data() expects the data_count parameter to be the number of longs, not bytes. ================================================================== BUG: KASAN: stack-out-of-bounds in syscall_stub_data+0x70/0xe0 Read of size 128 at addr 000000006411f6f0 by task swapper/1 CPU: 0 PID: 1 Comm: swapper Not tainted 5.18.0+ #18 Call Trace: show_stack.cold+0x166/0x2a7 __dump_stack+0x3a/0x43 dump_stack_lvl+0x1f/0x27 print_report.cold+0xdb/0xf81 kasan_report+0x119/0x1f0 kasan_check_range+0x3a3/0x440 memcpy+0x52/0x140 syscall_stub_data+0x70/0xe0 write_ldt_entry+0xac/0x190 init_new_ldt+0x515/0x960 init_new_context+0x2c4/0x4d0 mm_init.constprop.0+0x5ed/0x760 mm_alloc+0x118/0x170 0x60033f48 do_one_initcall+0x1d7/0x860 0x60003e7b kernel_init+0x6e/0x3d4 new_thread_handler+0x1e7/0x2c0 The buggy address belongs to stack of task swapper/1 and is located at offset 64 in frame: init_new_ldt+0x0/0x960 This frame has 2 objects: [32, 40) 'addr' [64, 80) 'desc' ==================================================================
AI-Powered Analysis
Technical Analysis
CVE-2022-49395 is a vulnerability identified in the Linux kernel, specifically related to an out-of-bounds read error in the setup of the Local Descriptor Table (LDT). The issue arises in the syscall_stub_data() function, which incorrectly interprets the data_count parameter as the number of bytes rather than the number of longs, leading to a stack-based out-of-bounds read. This flaw was detected by the Kernel Address Sanitizer (KASAN) during the initialization of new LDT entries, causing a read of 128 bytes beyond the intended stack buffer. The vulnerability is rooted in the improper handling of memory boundaries during the LDT setup, which is a critical component in managing segment descriptors for processes. The bug manifests during kernel initialization and context setup, as indicated by the stack trace involving functions like init_new_ldt and init_new_context. Although the vulnerability results in an out-of-bounds read rather than a write, it can potentially lead to information disclosure or kernel instability. The affected versions are specific Linux kernel commits identified by their hashes, and the vulnerability was published on February 26, 2025. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-49395 depends on their reliance on affected Linux kernel versions, particularly in environments where kernel initialization and context switching are critical, such as servers, cloud infrastructure, and embedded systems. The out-of-bounds read could potentially expose sensitive kernel stack data, leading to information leakage that attackers might leverage for privilege escalation or further exploitation. Additionally, the instability caused by such memory errors could result in system crashes or denial of service, affecting availability. Organizations running customized or older Linux kernels that include the vulnerable commits are at higher risk. Given the Linux kernel's widespread use across European enterprises, cloud providers, and public sector infrastructure, this vulnerability could affect a broad range of systems if unpatched. However, the lack of known exploits and the complexity of triggering this bug during kernel initialization somewhat limit immediate risk. Still, the potential for exploitation in targeted attacks or as part of a multi-stage attack chain remains a concern.
Mitigation Recommendations
To mitigate CVE-2022-49395, European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability involves kernel initialization code, ensuring that all kernel updates from trusted sources are applied promptly is critical. Organizations should audit their systems to identify Linux kernel versions matching the affected commits and schedule immediate upgrades. For environments where kernel updates are challenging, such as embedded devices, consider applying vendor-provided patches or recompiling kernels with the fix. Additionally, enabling Kernel Address Sanitizer (KASAN) in test environments can help detect similar memory issues proactively. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable systems. Monitoring kernel logs for unusual crashes or KASAN reports can provide early warning signs of exploitation attempts. Finally, organizations should maintain robust incident response plans to address potential kernel-level compromises.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.562Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe58b4
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 6:42:57 AM
Last updated: 8/17/2025, 2:16:27 AM
Views: 17
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.