The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-0516

CVE-2022-0516: Linux Kernel Privilege Escalation Flaw

CVE-2022-0516 is a privilege escalation vulnerability in the Linux Kernel KVM for s390 that allows local attackers to gain unauthorized memory write access. This article covers technical details, affected versions, and mitigation.

Published: February 17, 2026

CVE-2022-0516 Overview

A vulnerability was discovered in the kvm_s390_guest_sida_op function located in arch/s390/kvm/kvm-s390.c within the KVM (Kernel-based Virtual Machine) subsystem for s390 architecture in the Linux kernel. This security flaw enables a local attacker with standard user privileges to gain unauthorized write access to memory. The vulnerability affects Linux kernel versions prior to 5.17-rc4 and has widespread impact across enterprise Linux distributions, virtualization platforms, and storage appliance firmware.

Critical Impact

Local privilege escalation vulnerability allowing unauthorized memory write access, potentially leading to complete system compromise on s390 virtualization environments.

Affected Products

  • Linux Kernel versions prior to 5.17-rc4
  • Red Hat Enterprise Linux 8.x and related EUS versions
  • Red Hat Virtualization Host 4.0
  • Fedora 34 and 35
  • Debian Linux 11.0
  • Red Hat Enterprise Linux for IBM z Systems
  • NetApp H-Series Storage Firmware (H300s, H500s, H700s, H300e, H500e, H700e, H410s, H410c)

Discovery Timeline

  • 2022-03-10 - CVE-2022-0516 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2022-0516

Vulnerability Analysis

This vulnerability resides in the KVM hypervisor implementation for IBM s390 mainframe architecture. The flaw exists within the kvm_s390_guest_sida_op function, which handles operations on the Secure Instruction Data Area (SIDA) for guest virtual machines. Due to insufficient validation of user-supplied parameters, a local attacker with normal user privileges can manipulate memory operations to achieve unauthorized write access.

The vulnerability is particularly concerning in virtualized environments where multiple tenants share the same physical hardware, as it could allow an attacker to break out of VM isolation boundaries or escalate privileges within the host system. The local attack vector requires the attacker to have initial access to the system, but the low complexity and lack of user interaction requirements make exploitation straightforward once this access is obtained.

Root Cause

The root cause of this vulnerability stems from missing access checks in the kvm_s390_guest_sida_op function. The function fails to properly validate memory access boundaries and permissions before performing write operations on behalf of guest VMs. This lack of proper access control validation allows an attacker to specify memory regions that should not be accessible, resulting in unauthorized memory write capabilities.

The vulnerability classification under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) indicates that the flaw may also expose sensitive information during the exploitation process, though the primary impact is the unauthorized memory write access.

Attack Vector

The attack vector is local, requiring the attacker to have an authenticated session on the vulnerable system. An attacker would need to:

  1. Gain local access to a system running KVM on s390 architecture
  2. Interact with the KVM subsystem through standard user-level interfaces
  3. Craft malicious requests to the kvm_s390_guest_sida_op function
  4. Exploit the missing access checks to write to unauthorized memory regions

The exploitation does not require elevated privileges initially, making it a privilege escalation vector. Once successful, the attacker can achieve high impact on confidentiality, integrity, and availability of the affected system.

The vulnerability mechanism involves improper handling of SIDA operations within the KVM s390 subsystem. The specific technical details of exploitation can be found in the Linux Kernel Commit Details and the Red Hat Bug Report #2050237.

Detection Methods for CVE-2022-0516

Indicators of Compromise

  • Unusual KVM-related system calls originating from non-privileged user processes on s390 systems
  • Unexpected memory access patterns in kernel logs related to SIDA operations
  • Process activity interacting with /dev/kvm from accounts that should not have virtualization access
  • Kernel oops or panic messages referencing kvm_s390_guest_sida_op or related functions

Detection Strategies

  • Monitor system calls to the KVM subsystem, particularly from non-root users on s390 architecture systems
  • Implement kernel auditing rules to track access to /dev/kvm device nodes
  • Deploy endpoint detection solutions capable of identifying anomalous kernel-level memory operations
  • Review authentication logs for suspicious local access patterns preceding kernel-related anomalies

Monitoring Recommendations

  • Enable comprehensive kernel logging with focus on KVM subsystem events
  • Configure audit rules using auditd to track KVM device access: auditctl -w /dev/kvm -p rwxa -k kvm_access
  • Implement memory integrity monitoring on critical s390 virtualization hosts
  • Establish baseline behavior for KVM operations and alert on deviations

How to Mitigate CVE-2022-0516

Immediate Actions Required

  • Upgrade Linux kernel to version 5.17-rc4 or later on all affected s390 systems
  • Apply vendor-specific security patches from Red Hat, Debian, Fedora, or NetApp as applicable
  • Restrict local access to systems running KVM on s390 architecture to only trusted users
  • Review and limit permissions on /dev/kvm to minimize the attack surface

Patch Information

The vulnerability has been addressed in Linux kernel version 5.17-rc4 and later. The fix is documented in commit 09a93c1df3eafa43bcdfd7bf837c574911f12f55 in the upstream Linux kernel repository. Organizations should apply the appropriate vendor patches based on their distribution:

  • Red Hat: See Red Hat Bug Report #2050237 for RHEL-specific guidance
  • Debian: Apply patches from Debian Security Advisory DSA-5092
  • NetApp: Refer to NetApp Security Advisory NTAP-20220331-0009 for storage appliance firmware updates

Workarounds

  • Restrict physical and remote access to s390 virtualization hosts to minimize local attack surface
  • Implement mandatory access control (SELinux/AppArmor) policies to limit KVM subsystem access
  • Consider disabling KVM on s390 systems where virtualization is not actively required until patches can be applied
  • Segment virtualization infrastructure to isolate potentially affected systems from critical workloads
bash
# Restrict KVM device access to trusted groups only
chmod 660 /dev/kvm
chown root:kvm /dev/kvm

# Add audit rules for KVM access monitoring
auditctl -w /dev/kvm -p rwxa -k cve_2022_0516_kvm_monitor

# Verify current kernel version
uname -r
# Ensure version is 5.17-rc4 or later, or vendor-patched equivalent

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-200

  • NVD-CWE-noinfo
  • Technical References
  • NetApp Security Advisory NTAP-20220331-0009

  • Debian Security Advisory DSA-5092
  • Vendor Resources
  • Red Hat Bug Report #2050237

  • Linux Kernel Commit Details
  • Related CVEs
  • CVE-2026-31411: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-23438: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-23439: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-23437: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English