CVE-2022-50346

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's ext4 filesystem during rename operations can trigger a kernel warning and potential denial of service. This affects Linux systems using ext4 filesystem with quota support enabled. The issue occurs when renaming files triggers quota initialization failures.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific affected versions not explicitly stated, but patches available for multiple stable branches
Operating Systems: Linux distributions using ext4 filesystem
Default Config Vulnerable: ✅ No
Notes: Requires ext4 filesystem with quota support enabled. Not all systems have quotas enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, potentially disrupting system availability.

🟠

Likely Case

Kernel warning messages in system logs and possible system instability during rename operations.

🟢

If Mitigated

Minor performance impact during rename operations with proper quota initialization.

🌐 Internet-Facing: LOW - Requires local filesystem access and specific rename operations.
🏢 Internal Only: MEDIUM - Local users or processes with rename permissions could trigger the issue.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to perform rename operations on ext4 filesystem with quotas enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with commits: 13271fbbe85d, 135ba9146f4d, 33fd7031d634, 67f6d5a4043f, 7dfb8259f66f

Vendor Advisory: https://git.kernel.org/stable/c/13271fbbe85d73a7c47058f56a52f2a7f00d6e39

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable quota support

Linux

Disable disk quota support on ext4 filesystems to prevent the race condition

tune2fs -Q ^usrquota,^grpquota /dev/device
remount filesystem after changes

🧯 If You Can't Patch

  • Disable quota support on critical ext4 filesystems
  • Monitor system logs for ext4_xattr_block_set warnings and investigate rename operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ext4 quota is enabled: grep -r quota /etc/fstab && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated: uname -r and check for warning messages in dmesg related to ext4_xattr_block_set

📡 Detection & Monitoring

Log Indicators:

  • WARNING messages in dmesg/kernel logs containing 'ext4_xattr_block_set'
  • System logs showing ext4 rename operations failing

Network Indicators:

  • None - local filesystem issue

SIEM Query:

source="kernel" AND "ext4_xattr_block_set" AND "WARNING"

🔗 References

📤 Share & Export