The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-1789

CVE-2022-1789: Linux Kernel Buffer Overflow Vulnerability

CVE-2022-1789 is a buffer overflow vulnerability in Linux Kernel caused by a NULL pointer dereference when INVPCID is executed with shadow paging enabled. This article covers technical details, affected versions, and mitigations.

Published: February 11, 2026

CVE-2022-1789 Overview

CVE-2022-1789 is a NULL pointer dereference vulnerability in the Linux Kernel's KVM (Kernel-based Virtual Machine) subsystem. The vulnerability occurs when shadow paging is enabled and the INVPCID instruction is executed with CR0.PG=0 (paging disabled). Under these conditions, a call to kvm_mmu_invpcid_gva is made, but the invlpg callback is not properly set, resulting in a NULL pointer dereference that can crash the system or potentially allow for further exploitation.

Critical Impact

An attacker with physical access to a vulnerable system running KVM virtualization can trigger a kernel panic through NULL pointer dereference, causing denial of service and potentially achieving elevated privileges on the host system.

Affected Products

  • Linux Kernel (multiple versions with KVM support)
  • Fedora 34, 35, and 36
  • Red Hat Enterprise Linux 9.0
  • Debian Linux 11.0

Discovery Timeline

  • June 2, 2022 - CVE-2022-1789 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2022-1789

Vulnerability Analysis

This vulnerability resides in the KVM memory management unit (MMU) code, specifically in how the INVPCID (Invalidate Process-Context Identifier) instruction is handled when shadow paging is active. The Linux kernel's KVM hypervisor uses shadow paging as one method to virtualize guest memory by maintaining shadow page tables that map guest virtual addresses to host physical addresses.

The root issue stems from a missing validation check before dereferencing the invlpg callback pointer. When a guest virtual machine executes the INVPCID instruction while paging is disabled (CR0.PG=0), the KVM MMU code path calls kvm_mmu_invpcid_gva, which expects the invlpg callback to be properly initialized. However, under these specific conditions, the callback remains NULL, leading to a NULL pointer dereference when the code attempts to invoke it.

Root Cause

The vulnerability is classified under CWE-476 (NULL Pointer Dereference). The core issue is improper initialization and validation of the invlpg callback function pointer within the KVM MMU subsystem. When shadow paging is enabled but the guest has paging disabled (CR0.PG=0), the code path incorrectly assumes the callback is always valid. This architectural oversight means that a specific combination of virtualization settings and guest behavior can trigger the NULL dereference.

Attack Vector

The attack requires physical access to the target system (Attack Vector: Physical). An attacker would need to:

  1. Have access to a system running KVM virtualization with shadow paging enabled
  2. Create or control a virtual machine guest
  3. Execute the INVPCID instruction from within the guest while ensuring paging is disabled (CR0.PG=0)
  4. This triggers the vulnerable code path in the host kernel, causing a NULL pointer dereference

The exploitation scenario involves crafting specific guest CPU states that trigger the vulnerable condition in the host's KVM subsystem. Since the attack requires physical access, the threat is limited to scenarios where an attacker has direct console or hardware access to virtualization infrastructure.

Detection Methods for CVE-2022-1789

Indicators of Compromise

  • Kernel panic or crash logs referencing kvm_mmu_invpcid_gva or related KVM MMU functions
  • System crash dumps showing NULL pointer dereference in KVM modules
  • Unexpected virtual machine terminations accompanied by host kernel errors
  • Audit logs showing unusual guest VM behavior with paging manipulation

Detection Strategies

  • Monitor kernel logs (dmesg, /var/log/kern.log) for KVM-related NULL pointer dereference messages
  • Implement crash dump analysis to identify exploitation attempts targeting KVM MMU code paths
  • Deploy kernel live patching monitoring to ensure patches are applied and active
  • Use intrusion detection systems to flag unusual patterns in virtualization workloads

Monitoring Recommendations

  • Enable kernel crash dump collection (kdump) to capture detailed information on system crashes
  • Configure alerting for kernel oops or panic events related to KVM subsystem
  • Monitor virtualization host stability metrics and correlate with guest VM activity
  • Review system audit logs for suspicious virtualization configuration changes

How to Mitigate CVE-2022-1789

Immediate Actions Required

  • Apply the latest kernel security updates from your Linux distribution vendor
  • Review and update Fedora systems to patched kernel versions as per Fedora Package Announcements
  • Update Debian 11 systems according to Debian Security Advisory DSA-5161
  • Reboot systems after kernel updates to ensure the patched kernel is loaded

Patch Information

Security patches have been released by major Linux distributions to address this vulnerability. Red Hat has tracked this issue in Bug Report #1832397. Debian has released patches as documented in DSA-5161. Fedora users should apply updates from the official package repositories.

The fix involves proper initialization and validation of the invlpg callback pointer before dereferencing, ensuring that the NULL pointer condition cannot occur when INVPCID is executed with paging disabled.

Workarounds

  • Restrict physical access to virtualization host systems to trusted personnel only
  • Consider disabling shadow paging in KVM if not required (use hardware-assisted paging where available)
  • Implement network segmentation to limit access to virtualization management interfaces
  • Monitor guest VM behavior and restrict untrusted workloads until patches are applied
bash
# Check current kernel version and compare against patched versions
uname -r

# Update kernel on Debian/Ubuntu systems
sudo apt update && sudo apt upgrade linux-image-$(uname -r)

# Update kernel on Fedora systems
sudo dnf update kernel

# Update kernel on RHEL/CentOS systems
sudo yum update kernel

# Reboot to load the patched kernel
sudo reboot

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score6.8

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Technical References
  • Red Hat Bug Report #1832397

  • GitHub Blog on Bias

  • CERT Vulnerability ID #647177

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Debian Security Advisory DSA-5161
  • Related CVEs
  • CVE-2026-23448: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-23447: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31395: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31402: Linux Kernel Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English