CVE-2022-49362
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's NFSD (Network File System Daemon) that could allow an attacker to crash the kernel or potentially execute arbitrary code. It affects Linux systems running NFSD with vulnerable kernel versions. Attackers would need local access to exploit this vulnerability.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, or potential privilege escalation to kernel-level code execution, resulting in complete system compromise.
Likely Case
Kernel crash causing denial of service, requiring system reboot to restore functionality.
If Mitigated
Limited impact due to need for local access and specific NFSD usage; properly segmented systems would see minimal impact.
🎯 Exploit Status
Exploitation requires local access and knowledge of kernel internals; use-after-free bugs can be challenging to exploit reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits: 261eabe19cb28e4a8587a4442d257b543d7c2d57, 333dcc94ebf53f79f3dc0e7a7c16700bc7ff7e57, ada1757b259f353cade47037ee0a0249b4cddad3, b6c71c66b0ad8f2b59d9bc08c7a5079b110bec01
Vendor Advisory: https://git.kernel.org/stable/c/261eabe19cb28e4a8587a4442d257b543d7c2d57
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable NFSD
LinuxIf NFSD is not required, disable it to eliminate the attack surface.
systemctl stop nfs-server
systemctl disable nfs-server
🧯 If You Can't Patch
- Disable NFSD service if not needed
- Implement strict access controls to limit local user access to vulnerable systems
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with patched versions in git commits; verify if NFSD is running with 'systemctl status nfs-server' or 'ps aux | grep nfsd'.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated to include the fix commits; ensure NFSD still functions properly after patch.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs in /var/log/messages or dmesg
- NFSD crash logs
- System reboot events without clear cause
Network Indicators:
- Sudden loss of NFS service availability
SIEM Query:
Search for kernel panic events or unexpected system reboots on Linux servers running NFSD