CVE-2022-49259

5.5 MEDIUM

📋 TL;DR

This CVE describes a kernel-level race condition in the Linux block subsystem where a parent kobject is deleted before its child kobjects, potentially causing system instability. The vulnerability can trigger kernel warnings and system crashes, affecting all Linux systems using the vulnerable kernel versions. While not directly exploitable for privilege escalation, it can lead to denial of service.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches exist for multiple stable branches (see references)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires block/crypto subsystem usage. Systems using disk encryption or certain storage configurations are more likely to trigger the issue.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to complete denial of service, potentially requiring physical access to reboot affected systems.

🟠

Likely Case

Kernel warning messages in system logs and potential system instability during storage operations, but no direct privilege escalation.

🟢

If Mitigated

Minor performance impact during storage operations with warning messages in logs, but system remains operational.

🌐 Internet-Facing: LOW - This is a local kernel issue not directly exploitable over network interfaces.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger the condition, causing system instability affecting all users on the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and specific conditions to trigger the race condition. No known weaponized exploits exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with fixes (see git references in CVE)

Vendor Advisory: https://git.kernel.org/stable/c/0b5924a14d64487ebd51127b0358d06066ef5384

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable block crypto subsystem

linux

Prevent triggering of vulnerable code path by disabling cryptographic block device support

echo 'blacklist blk-crypto' > /etc/modprobe.d/disable-blk-crypto.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Monitor system logs for 'sysfs group not found' warnings and restart affected services
  • Avoid operations that trigger block device removal while crypto operations are active

🔍 How to Verify

Check if Vulnerable:

Check kernel version against known vulnerable ranges and examine dmesg for 'sysfs group not found for kobject crypto' warnings

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to patched version and no related warnings appear in system logs after patch application

📡 Detection & Monitoring

Log Indicators:

  • WARNING: CPU: 0 PID: 1 at fs/sysfs/group.c:278 sysfs_remove_group
  • sysfs group 'modes' not found for kobject 'crypto'
  • Call Trace including blk_crypto_sysfs_unregister

Network Indicators:

  • None - this is a local kernel issue

SIEM Query:

source="kernel" AND ("sysfs_remove_group" OR "blk_crypto_sysfs_unregister" OR "sysfs group not found for kobject crypto")

🔗 References

📤 Share & Export