CVE-2022-49763
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's NTFS filesystem driver. It allows attackers to trigger kernel memory corruption by mounting a specially crafted NTFS filesystem, potentially leading to system crashes or arbitrary code execution. All Linux systems with NTFS support enabled are affected.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic, system crash, or arbitrary code execution with kernel privileges leading to complete system compromise.
Likely Case
System crash or kernel panic when mounting malicious NTFS filesystems, causing denial of service.
If Mitigated
No impact if NTFS support is disabled or systems don't mount untrusted NTFS filesystems.
🎯 Exploit Status
Requires ability to mount malicious NTFS filesystem. Exploitation requires local access or tricking users into mounting malicious drives.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commits 266bd5306286, 4863f8154630, 5330c423b862, 79f3ac7dcd12, or b825bfbbaafb
Vendor Advisory: https://git.kernel.org/stable/c/266bd5306286316758e6246ea0345133427b0f62
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Rebuild kernel if compiling from source with the fixes. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable NTFS module
linuxPrevent loading of NTFS kernel module to eliminate attack surface
echo 'blacklist ntfs' >> /etc/modprobe.d/blacklist-ntfs.conf
rmmod ntfs
Mount restrictions
linuxRestrict who can mount filesystems and what types
Add 'nosuid,nodev,noexec' to NTFS mounts in /etc/fstab
Use mount restrictions via pam_mount or similar
🧯 If You Can't Patch
- Disable NTFS filesystem support completely
- Implement strict mount policies and user education about untrusted filesystems
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if NTFS module is loaded: 'uname -r' and 'lsmod | grep ntfs'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and test with known vulnerable NTFS image if available
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN reports in dmesg
- System crashes during filesystem mount
Network Indicators:
- None - local exploitation only
SIEM Query:
Search for: 'KASAN: use-after-free', 'ntfs_attr_find', or kernel oops/panic events
🔗 References
- https://git.kernel.org/stable/c/266bd5306286316758e6246ea0345133427b0f62
- https://git.kernel.org/stable/c/4863f815463034f588a035cfd99cdca97a4f1069
- https://git.kernel.org/stable/c/5330c423b86263ac7883fef0260b9e2229cb531e
- https://git.kernel.org/stable/c/79f3ac7dcd12c05b7539239a4c6fa229a50d786c
- https://git.kernel.org/stable/c/b825bfbbaafbe8da2037e3a778ad660c59f9e054
- https://git.kernel.org/stable/c/d0006d739738a658a9c29b438444259d9f71dfa0
- https://git.kernel.org/stable/c/d85a1bec8e8d552ab13163ca1874dcd82f3d1550
- https://git.kernel.org/stable/c/fb2004bafd1932e08d21ca604ee5844f2b7f212d