Related Vulnerabilities: CVE-2022-28796  

A use-after-free flaw was found in the Linux kernel’s journaling layer of the ext4 and OCFS2 file system functionality in the way a user can trigger a race condition during writing to the file system. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Description

A use-after-free flaw was found in the Linux kernel’s journaling layer of the ext4 and OCFS2 file system functionality in the way a user can trigger a race condition during writing to the file system. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Statement

This kind of race condition is hard to trigger and there are no known reproducers to trigger it, so keeping the impact moderate.

This kind of race condition is hard to trigger and there are no known reproducers to trigger it, so keeping the impact moderate.

Mitigation

To mitigate this issue, prevent the module jbd2 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically. However, if using ext4 or OCFS2 file systems with journaling enabled, then cannot disable this module.

Additional Information

  • Bugzilla 2073941: CVE-2022-28796 kernel: a use-after-free caused by a transaction_t race condition
  • CWE-416: Use After Free
  • FAQ: Frequently asked questions about CVE-2022-28796