CVE-2022-48937
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-48937 affects the Linux kernel's iouring subsystem, specifically within the ioadd_buffers() function. The vulnerability was discovered when looping approximately 65,535 times while making kmalloc() calls, which could trigger soft lockups, particularly when debugging features like KASAN are enabled. This issue was first reported by syzbot and affects Linux kernel versions from 5.7 up to versions before 5.10.103, 5.11 through 5.15.26, and 5.16 through 5.16.12 (NVD).

Technical details

The vulnerability manifests as a soft lockup condition in the kernel's io_uring subsystem. When performing approximately 65,535 iterations of kmalloc() calls, the system can experience CPU lockups lasting up to 26 seconds. The issue is particularly pronounced when kernel debugging features like KASAN (Kernel Address Sanitizer) are enabled. The vulnerability has been assigned a CVSS v3.1 base score of 3.3 (LOW) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L (NVD).

Impact

The primary impact of this vulnerability is a potential denial of service condition through CPU soft lockups. When triggered, the affected CPU can become unresponsive for extended periods (documented cases show up to 26 seconds), which could impact system performance and availability (Kernel Patch).

Mitigation and workarounds

The vulnerability has been fixed by adding a schedule point in ioaddbuffers() function. The fix involves adding a cond_resched() call within the loop to prevent CPU soft lockups. Red Hat Enterprise Linux is not vulnerable to this CVE as it does not affect the versions or configurations of the Linux kernel used in its distributions (Red Hat, Kernel Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management