CVE-2022-49377

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's block multi-queue (blk-mq) subsystem. It allows attackers with local access to potentially cause kernel crashes or execute arbitrary code. All Linux systems using affected kernel versions are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches exist for multiple stable branches (see references).
Operating Systems: All Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires blk-mq subsystem to be in use (common in modern Linux systems).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, kernel panic causing system crash, or arbitrary code execution in kernel context.

🟠

Likely Case

Kernel panic leading to denial of service (system crash) when triggered by malicious local users.

🟢

If Mitigated

Limited to denial of service if exploit fails to achieve code execution, or no impact if system is patched.

🌐 Internet-Facing: LOW - This requires local access to the system, not directly exploitable over network.
🏢 Internal Only: HIGH - Any local user (including unprivileged) could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of kernel exploitation techniques. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with fixes (see git references in CVE)

Vendor Advisory: https://git.kernel.org/stable/c/460aa288c5cd0544dcf933a2f0ad0e8c6d2d35ff

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user accounts and implement strict access controls to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts
  • Monitor systems for kernel panic events and investigate suspicious local user activity

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r and compare with your distribution's security advisories for affected versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update: uname -r and ensure it matches patched version from vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • System crash/reboot events
  • Suspicious local user activity

Network Indicators:

  • None - this is local-only vulnerability

SIEM Query:

Search for kernel panic events or unexpected system reboots in system logs.

🔗 References

📤 Share & Export