CVE-2022-49412

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's BFQ I/O scheduler allows local attackers to cause kernel memory corruption, potentially leading to system crashes or privilege escalation. This affects Linux systems using the BFQ scheduler with specific timing conditions during queue merging operations.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with BFQ scheduler before fixes in stable releases (specific versions vary by distribution)
Operating Systems: Linux distributions using BFQ I/O scheduler
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the BFQ I/O scheduler. Many distributions use other schedulers by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or potential privilege escalation to root via kernel memory corruption.

🟠

Likely Case

System instability, crashes, or denial of service affecting I/O performance.

🟢

If Mitigated

Minimal impact with proper kernel hardening and container isolation.

🌐 Internet-Facing: LOW - Requires local access to exploit.
🏢 Internal Only: MEDIUM - Local users or compromised containers could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and specific timing conditions during I/O operations with cgroup reparenting.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 5ee21edaed09, 8abc8763b11c, a16c65cca7d2, or c1cee4ab36ac

Vendor Advisory: https://git.kernel.org/stable/c/5ee21edaed09e6b25f2c007b3f326752bc89bacf

Restart Required: Yes

Instructions:

1. Update kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable BFQ scheduler

all

Switch to a different I/O scheduler like CFQ or deadline

echo cfq > /sys/block/[device]/queue/scheduler

Disable cgroup I/O controller

all

Prevent cgroup reparenting that triggers the vulnerability

mount -t cgroup -o none,name=cgroup /sys/fs/cgroup

🧯 If You Can't Patch

  • Restrict local user access to systems using BFQ scheduler
  • Implement strict container isolation to prevent cgroup manipulation

🔍 How to Verify

Check if Vulnerable:

Check if BFQ scheduler is active: cat /sys/block/[device]/queue/scheduler | grep -i bfq

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits or is newer than patched versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN reports of use-after-free in __bfq_deactivate_entity

Network Indicators:

  • None - local vulnerability only

SIEM Query:

kernel:panic OR kernel:BUG: KASAN: use-after-free in __bfq_deactivate_entity

🔗 References

📤 Share & Export