CVE-2022-49347

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's ext4 filesystem that can trigger a kernel panic (denial of service) when handling inline data conversion under delay allocation mode. This affects Linux systems using ext4 filesystems with inline data enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before fixes in stable releases (specifically before commits referenced in CVE)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ext4 filesystem with inline data feature enabled. Most modern Linux distributions use ext4 by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data corruption or loss.

🟠

Likely Case

System crash requiring reboot, causing temporary service disruption.

🟢

If Mitigated

No impact if patched or workarounds applied.

🌐 Internet-Facing: LOW - Requires local filesystem access and specific timing conditions.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger the bug, causing system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires specific timing and filesystem operations

Exploitation requires local access and specific sequence of filesystem operations with precise timing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing fixes from stable commits: 013f12bdedb96816aaa27ee04349f4433d361f52, 18a759f7f99f0b65a08ff5b7e745fc405a42bde4, 19918ec7717d87d5ab825884a46b26b21375d7ce, 1b061af037646c9cdb0afd8a8d2f1e1c06285866, 1cde35417edc0370fb0179a4e38b78a15350a8d0

Vendor Advisory: https://git.kernel.org/stable/c/013f12bdedb96816aaa27ee04349f4433d361f52

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable ext4 inline data feature

linux

Mount ext4 filesystems with 'noinline_data' option to disable inline data feature

mount -o remount,noinline_data /mount/point
Add 'noinline_data' to /etc/fstab mount options

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor system logs for ext4 filesystem errors and kernel panics

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if using ext4 with inline data: uname -r && grep -E 'ext4.*inline_data' /proc/mounts

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check for absence of ext4 error messages in dmesg

📡 Detection & Monitoring

Log Indicators:

  • kernel: BUG at fs/ext4/inode.c:2708
  • EXT4-fs error: ext4_mb_generate_buddy
  • kernel panic related to ext4_writepages

Network Indicators:

  • None - local filesystem issue

SIEM Query:

source="kernel" AND ("ext4_writepages" OR "ext4_mb_generate_buddy" OR "BUG at fs/ext4/inode.c")

🔗 References

📤 Share & Export