CVE-2022-49270

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's device mapper (dm) subsystem that occurs during cleanup of zoned block devices. An attacker with local access could potentially exploit this to cause a kernel crash (denial of service) or possibly execute arbitrary code with kernel privileges. Systems using Linux kernel with device mapper and zoned block devices are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution, but generally before kernel versions containing the fix)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using device mapper with zoned block devices. Most standard configurations are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, or potential arbitrary code execution with kernel privileges resulting in complete system compromise.

🟠

Likely Case

Kernel crash leading to system instability or denial of service requiring reboot.

🟢

If Mitigated

No impact if patched or if zoned block devices are not in use.

🌐 Internet-Facing: LOW - This requires local access to the system.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to cause system instability or potentially gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of zoned block device operations. The vulnerability is triggered during device cleanup operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing commits 0987f00a76a17aa7213da492c00ed9e5a6210c73 or related fixes

Vendor Advisory: https://git.kernel.org/stable/c/0987f00a76a17aa7213da492c00ed9e5a6210c73

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid zoned block devices

all

Do not use zoned block devices with device mapper if possible

🧯 If You Can't Patch

  • Restrict local user access to systems using zoned block devices
  • Monitor for kernel panic/crash events and investigate any suspicious device mapper operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if using device mapper with zoned block devices. Vulnerable if kernel version is before the fix and zoned devices are in use.

Check Version:

uname -r

Verify Fix Applied:

Check that kernel version includes the fix commit or is from a distribution that has backported the patch.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN use-after-free reports in kernel logs
  • Device mapper error messages during cleanup

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for: 'KASAN: use-after-free', 'dm_cleanup_zoned_dev', or kernel panic events

🔗 References

📤 Share & Export