
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49295 affects the Linux kernel's Network Block Device (NBD) module. The vulnerability stems from a race condition between module removal and netlink command handling in the nbd_cleanup() function. This issue was discovered when a NULL pointer dereference occurred during the module's cleanup process (Kernel Git).
The vulnerability occurs due to improper ordering of operations in the nbdcleanup() function. The issue manifests when genlunregister_family() is called after other cleanup operations, creating a race condition between module removal and netlink command handling. This can lead to a NULL pointer dereference at address 0x98, triggering a kernel oops. The issue was confirmed in Linux kernel version 5.14.0-rc4 running on QEMU Standard PC hardware (Kernel Git).
When triggered, this vulnerability causes a kernel oops due to NULL pointer dereference, which can lead to system instability or denial of service. The issue occurs in the context of the NBD module, which is used for network block devices (Kernel Git).
The issue has been fixed by modifying the nbdcleanup() function to call genlunregister_family() before waiting for the completion of netlink commands. This ensures proper cleanup order and prevents the race condition (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."