CVE-2022-49411
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's BFQ I/O scheduler allows attackers to cause kernel crashes or potentially execute arbitrary code with kernel privileges. This affects Linux systems using the BFQ scheduler, primarily those with cgroup configurations. Attackers need local access to exploit this vulnerability.
💻 Affected Systems
- Linux kernel with BFQ I/O scheduler enabled
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash or potential privilege escalation to kernel-level code execution, enabling complete system compromise.
Likely Case
System instability, kernel crashes, or denial of service affecting system availability.
If Mitigated
Limited impact if proper access controls prevent local user exploitation and systems are isolated.
🎯 Exploit Status
Requires local access and knowledge of cgroup manipulation. No public exploits known as of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel versions containing the fix commits (e.g., 5.15.90+, 5.19.17+, 6.0.15+, 6.1.1+)
Vendor Advisory: https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable BFQ scheduler
LinuxSwitch to a different I/O scheduler to avoid the vulnerable code path
echo deadline > /sys/block/[device]/queue/scheduler
echo noop > /sys/block/[device]/queue/scheduler
Restrict cgroup access
LinuxLimit which users can create/manipulate cgroups to reduce attack surface
chmod 750 /sys/fs/cgroup
setfacl -m u:user:rx /sys/fs/cgroup
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized local users from accessing the system
- Monitor system logs for kernel panic or crash events and implement redundancy for critical systems
🔍 How to Verify
Check if Vulnerable:
Check if BFQ scheduler is active: cat /sys/block/[device]/queue/scheduler | grep -i bfq
Check Version:
uname -r
Verify Fix Applied:
Check kernel version is patched: uname -r and verify against distribution security advisories
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- System crash/reboot events
- OOM killer activity related to BFQ
Network Indicators:
- None - local exploitation only
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "general protection fault") AND ("bfq" OR "cgroup")
🔗 References
- https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd
- https://git.kernel.org/stable/c/51f724bffa3403a5236597e6b75df7329c1ec6e9
- https://git.kernel.org/stable/c/6ee0868b0c3ccead5907685fcdcdd0c08dfe4b0b
- https://git.kernel.org/stable/c/7781c38552e6cc54ed8e9040279561340516b881
- https://git.kernel.org/stable/c/97bd6c56bdcb41079e488e31df56809e3b2ce628
- https://git.kernel.org/stable/c/ccddf8cd411c1800863ed357064e56ceffd356bb