CVE-2022-49501

7.8 HIGH

📋 TL;DR

This CVE involves a use-after-free vulnerability in the Linux kernel's USB network driver (usbnet) that occurs during USB Ethernet adapter disconnection. The vulnerability allows potential kernel memory corruption when USB Ethernet devices are unplugged or disconnected. It affects Linux systems using USB Ethernet adapters.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions between the introduction of commit 2c9d6c2b871d and its reversion in stable patches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using USB Ethernet adapters. Systems without USB Ethernet adapters or with them permanently connected are not vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, with potential for local privilege escalation if an attacker can trigger memory corruption.

🟠

Likely Case

System instability or crash when USB Ethernet adapters are disconnected, requiring reboot to restore functionality.

🟢

If Mitigated

No impact if patched or if USB Ethernet adapters are not used.

🌐 Internet-Facing: LOW - Requires physical or local access to trigger via USB disconnection.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders with physical access to USB ports or through USB device management systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access to disconnect USB Ethernet adapters or ability to trigger USB device removal programmatically. No remote exploitation vector exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel stable versions via commits referenced in CVE

Vendor Advisory: https://git.kernel.org/stable/c/6d5deb242874d924beccf7eb3cef04c1c3b0da79

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Avoid USB Ethernet disconnection

all

Prevent disconnection of USB Ethernet adapters while system is running

Disable USB Ethernet support

linux

Remove or blacklist usbnet kernel module if USB Ethernet adapters are not needed

echo 'blacklist usbnet' >> /etc/modprobe.d/blacklist.conf
rmmod usbnet

🧯 If You Can't Patch

  • Avoid using USB Ethernet adapters - use built-in Ethernet or other network interfaces instead
  • Implement physical security controls to prevent unauthorized USB device disconnection

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if usbnet module is loaded: 'uname -r' and 'lsmod | grep usbnet'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and test USB Ethernet adapter disconnection without system instability

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • USB disconnection events followed by system instability

Network Indicators:

  • Sudden network interface disappearance without proper shutdown

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "use-after-free") AND "usbnet"

🔗 References

📤 Share & Export