CVE-2022-49465
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49465 is a vulnerability in the Linux kernel's block I/O throttling mechanism. The issue was discovered in the block throttling subsystem where a use-after-free condition could occur when setting the BIO_THROTTLED flag on throttled block I/O operations (Kernel Git).

Technical details

The vulnerability occurs in the block throttling code where all bio (block I/O) operations set the BIOTHROTTLED flag after _blkthrotlbio(). When a bio needs to be throttled, a timer is started and bio submission is halted until the timer expires, at which point the bio is submitted via blkthrotldispatchworkfn(). However, the BIO_THROTTLED flag was being set after the timer start, which could lead to accessing freed memory if the bio had already completed (Kernel Git).

Impact

This vulnerability could lead to use-after-free conditions in the kernel's block I/O subsystem, potentially causing system crashes or memory corruption. The issue affects the kernel's block layer which handles all block device I/O operations, making it a significant vulnerability for system stability and security (Kernel Git).

Mitigation and workarounds

The issue was fixed by moving the BIOTHROTTLED flag setting operation inside the queuelock protected region. The fix was implemented in the Linux kernel and backported to stable kernel versions (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management