CVE-2022-50422
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's libsas subsystem allows local attackers to potentially crash the system or execute arbitrary code. This affects systems using Serial Attached SCSI (SAS) storage with the vulnerable kernel versions. Attackers need local access to exploit this vulnerability.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to kernel compromise, system crash, or arbitrary code execution with kernel privileges.
Likely Case
Kernel panic or system crash causing denial of service, potentially leading to data corruption in storage operations.
If Mitigated
Limited impact with proper access controls preventing local attacker access to vulnerable systems.
🎯 Exploit Status
Exploitation requires local access and timing the race condition between timer deletion and task cleanup. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions with fixes: 117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe, 2e12ce270f0d926085c1209cc90397e307deef97, 46ba53c30666717cb06c2b3c5d896301cd00d0c0, a9e5176ead6de64f572ad5c87a72825d9d3c82ae, e45a1516d2933703a4823d9db71e17c3abeba24f
Vendor Advisory: https://git.kernel.org/stable/c/117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Check kernel version matches patched commits. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable SAS storage if not needed
linuxRemove or disable SAS storage controllers to eliminate attack surface
# Check SAS modules: lsmod | grep sas
# Remove modules: rmmod libsas
# Blacklist modules: echo 'blacklist libsas' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Restrict local access to systems using SAS storage through strict user permissions and access controls
- Implement kernel module signing and secure boot to prevent unauthorized kernel module loading
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if SAS modules are loaded: 'lsmod | grep sas' and 'uname -r' to compare with vulnerable versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits: 'cat /proc/version' should show patched kernel version
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- OOM killer messages related to SAS
- System crash dumps
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "BUG") AND "sas"
🔗 References
- https://git.kernel.org/stable/c/117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe
- https://git.kernel.org/stable/c/2e12ce270f0d926085c1209cc90397e307deef97
- https://git.kernel.org/stable/c/46ba53c30666717cb06c2b3c5d896301cd00d0c0
- https://git.kernel.org/stable/c/a9e5176ead6de64f572ad5c87a72825d9d3c82ae
- https://git.kernel.org/stable/c/e45a1516d2933703a4823d9db71e17c3abeba24f
- https://git.kernel.org/stable/c/f7a785177611ffc97d645fcbc196e6de6ad2421d