CVE-2022-49892

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's ftrace subsystem allows an attacker to cause memory corruption when multiple dynamic ftrace_ops with identical content are registered and unregistered. This affects Linux systems with ftrace enabled, potentially leading to kernel crashes or privilege escalation.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution; generally affects 5.10.x and potentially other versions with ftrace)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires ftrace to be enabled and dynamic ftrace_ops to be manipulated; not all systems have ftrace enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or privilege escalation to root via memory corruption leading to arbitrary code execution in kernel context.

🟠

Likely Case

Kernel crash or system instability when specific ftrace operations are performed, particularly in environments using perf or other tracing tools.

🟢

If Mitigated

Minimal impact if ftrace is disabled or systems are patched; otherwise potential for denial of service.

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on the system.
🏢 Internal Only: MEDIUM - Local users or processes with appropriate permissions could trigger the vulnerability, potentially leading to privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specific conditions with ftrace operations; no public exploits known as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 0e792b89e6800cd9cb4757a76a96f7ef3e8b6294, 88561a66777e7a2fe06638c6dcb22a9fae0b6733, cc1b9961a0ceb70f6ca4e2f4b8bb71c87c7a495c, ea5f2fd4640ecbb9df969bf8bb27733ae2183169

Vendor Advisory: https://git.kernel.org/stable/c/0e792b89e6800cd9cb4757a76a96f7ef3e8b6294

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable ftrace

linux

Disable the ftrace subsystem to prevent exploitation of this vulnerability

echo 0 > /sys/kernel/debug/tracing/tracing_on
echo nop > /sys/kernel/debug/tracing/current_tracer

🧯 If You Can't Patch

  • Restrict access to ftrace functionality to trusted users only
  • Monitor system logs for ftrace-related errors or crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ftrace is enabled: uname -r and check /sys/kernel/debug/tracing/tracing_on

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or is newer than vulnerable versions; check with distribution-specific tools like rpm -q kernel or dpkg -l linux-image

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN reports of use-after-free in ftrace
  • System crashes during tracing operations

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for kernel logs containing 'KASAN: use-after-free' or 'ftrace' with crash indicators

🔗 References

📤 Share & Export