CVE-2022-49085

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's DRBD (Distributed Replicated Block Device) subsystem. It allows attackers with local access to potentially crash the kernel or execute arbitrary code with kernel privileges. Systems using DRBD with vulnerable kernel versions are affected.

💻 Affected Systems

Products:
  • Linux kernel with DRBD support
Versions: Kernel versions containing the vulnerable DRBD code (specific versions depend on distribution backports)
Operating Systems: Linux distributions with DRBD enabled
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if DRBD module is loaded and in use. Many distributions don't enable DRBD by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level access leading to full system compromise, data corruption, or persistent backdoor installation.

🟠

Likely Case

Kernel panic or system crash causing denial of service and potential data loss in DRBD-managed storage.

🟢

If Mitigated

No impact if DRBD is not enabled or the system is patched.

🌐 Internet-Facing: LOW - Requires local access to exploit.
🏢 Internal Only: MEDIUM - Local attackers or compromised user accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of kernel exploitation techniques. Use-after-free bugs can be challenging to exploit reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 0489700bfeb1e53eb2039c2291c67e71b0b40103 or later

Vendor Advisory: https://git.kernel.org/stable/c/0489700bfeb1e53eb2039c2291c67e71b0b40103

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution vendor. 2. For custom kernels, apply the upstream patch. 3. Reboot the system to load the new kernel.

🔧 Temporary Workarounds

Disable DRBD module

Linux

Unload the DRBD kernel module if not required

modprobe -r drbd
echo 'blacklist drbd' > /etc/modprobe.d/blacklist-drbd.conf

🧯 If You Can't Patch

  • Ensure DRBD module is not loaded (check with 'lsmod | grep drbd')
  • Restrict local user access through proper privilege separation and monitoring

🔍 How to Verify

Check if Vulnerable:

Check if DRBD module is loaded: 'lsmod | grep drbd' and check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commit and DRBD module loads without errors

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes or panics
  • DRBD-related errors in dmesg

Network Indicators:

  • None - local exploitation only

SIEM Query:

Search for kernel panic events or DRBD module loading/unloading anomalies

🔗 References

📤 Share & Export