CVE-2022-49464
Linux Debian vulnerability analysis and mitigation

Overview

In the Linux kernel, a buffer copy overflow vulnerability was discovered in the EROFS (Enhanced Read-Only File System) ztailpacking feature. The vulnerability is tracked as CVE-2022-49464. The issue was discovered when a KASAN (Kernel Address Sanitizer) report indicated a use-after-free condition in the zerofsshifted_transform function (Kernel Git).

Technical details

The vulnerability occurs because the tail pcluster is not a complete filesystem block when ztailpacking is used. Specifically, the second part of an uncompressed tail pcluster may not be rq->pageofs_out. This leads to incorrect buffer size calculations and potential memory corruption. The issue was introduced by two previous commits: 'erofs: support unaligned data decompression' and 'erofs: support inline data decompression' (Kernel Git).

Impact

The vulnerability can result in a buffer overflow condition, which could potentially lead to memory corruption and system instability. The KASAN report showed a use-after-free condition with a read of size 4074 bytes, indicating potential unauthorized memory access (Kernel Git).

Mitigation and workarounds

The issue has been fixed by correcting the buffer size calculations in the zerofsshiftedtransform function. The fix involves using the correct size (lefthalf) instead of pageofsout when copying memory in the affected code paths. The patch has been merged into the Linux kernel (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management