CVE-2022-49406

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's block layer could cause a deadlock when reading sysfs attributes during disk removal. This affects Linux systems with specific kernel versions and could lead to system instability or denial of service. The vulnerability requires local access to trigger.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific kernel versions between initial introduction of blk_ia_range_sysfs_show() and patched versions
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with block layer sysfs interface enabled (default). Requires specific timing during disk removal operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System deadlock requiring hard reboot, causing denial of service and potential data loss if filesystems are affected.

🟠

Likely Case

Temporary system hang or kernel panic when removing storage devices, requiring system restart.

🟢

If Mitigated

Minor performance impact during storage operations with no security compromise.

🌐 Internet-Facing: LOW - Requires local access to trigger, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local users or processes could trigger deadlock affecting system stability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires precise timing and local access to trigger race condition.

Exploitation requires local access and specific timing during storage device removal operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 41e46b3c2aa24f755b2ae9ec4ce931ba5f0d8532, 717b078bc745ba9a262abebed9806a17e8bbb77b, dc107c805cde709866b59867ef72b9390199205e

Vendor Advisory: https://git.kernel.org/stable/c/41e46b3c2aa24f755b2ae9ec4ce931ba5f0d8532

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Avoid concurrent storage operations

linux

Prevent simultaneous disk removal and sysfs attribute reading operations

Disable affected sysfs interface

linux

Remove or restrict access to block layer sysfs attributes if not needed

echo 0 > /sys/block/[device]/queue/independent_access_ranges

🧯 If You Can't Patch

  • Restrict local user access to prevent triggering the race condition
  • Implement monitoring for system hangs during storage operations and have reboot procedures ready

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution's security advisories. Vulnerable if using unpatched kernel with affected code.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version matches patched release from vendor advisory. Check that commit 41e46b3c2aa24f755b2ae9ec4ce931ba5f0d8532 is included.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System hang during storage operations
  • Lockdep warnings in dmesg

SIEM Query:

source="kernel" AND ("deadlock" OR "lockdep" OR "sysfs_lock" OR "blk_ia_range")

🔗 References

📤 Share & Export