CVE-2022-49465
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's block I/O throttling subsystem (blk-throttle) allows local attackers to potentially crash the system or execute arbitrary code. The vulnerability occurs when a BIO structure is freed while still being marked as throttled, leading to memory corruption. This affects all Linux systems using the affected kernel versions.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to root, system crash, or arbitrary code execution leading to complete system compromise.
Likely Case
System crash or kernel panic causing denial of service, potentially leading to data corruption or loss.
If Mitigated
Limited impact if proper access controls prevent local user access; container escape possible in containerized environments.
🎯 Exploit Status
Requires local access and ability to trigger block I/O operations; timing-dependent exploitation makes reliable exploitation challenging.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commits 047ea38d41d90d748bca812a43339632f52ba715 or later
Vendor Advisory: https://git.kernel.org/stable/c/047ea38d41d90d748bca812a43339632f52ba715
Restart Required: Yes
Instructions:
1. Update kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.
🔧 Temporary Workarounds
Disable block I/O throttling
allTemporarily disable the blk-throttle subsystem to prevent exploitation
echo 0 > /sys/block/*/queue/throttle_enable
Disable cgroup blkio controller if in use
🧯 If You Can't Patch
- Restrict local user access to prevent untrusted users from running code
- Disable block I/O throttling features and monitor for system stability issues
🔍 How to Verify
Check if Vulnerable:
Check kernel version: uname -r and compare with distribution's security advisories
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commit: grep -q '047ea38d41d90d748bca812a43339632f52ba715' /proc/version_signature || echo 'Check kernel source'
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- KASAN use-after-free reports in dmesg
- System crashes during I/O operations
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("KASAN" OR "use-after-free" OR "blk-throttle")
🔗 References
- https://git.kernel.org/stable/c/047ea38d41d90d748bca812a43339632f52ba715
- https://git.kernel.org/stable/c/0cfc8a0fb07cde61915e4a77c4794c47de3114a4
- https://git.kernel.org/stable/c/24ba80efaf6e772f6132465fad08e20fb4767da7
- https://git.kernel.org/stable/c/5a011f889b4832aa80c2a872a5aade5c48d2756f
- https://git.kernel.org/stable/c/935fa666534d7b7185e8c6b0191cd06281be4290