
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49465 is a vulnerability in the Linux kernel's block I/O throttling mechanism. The issue was discovered in the block throttling subsystem where a use-after-free condition could occur when setting the BIO_THROTTLED flag on throttled block I/O operations (Kernel Git).
The vulnerability occurs in the block throttling code where all bio (block I/O) operations set the BIO_THROTTLED flag after __blk_throtl_bio(). When a bio needs to be throttled, a timer is started and bio submission is halted until the timer expires, at which point the bio is submitted via blk_throtl_dispatch_work_fn(). However, the BIO_THROTTLED flag was being set after the timer start, which could lead to accessing freed memory if the bio had already completed (Kernel Git).
This vulnerability could lead to use-after-free conditions in the kernel's block I/O subsystem, potentially causing system crashes or memory corruption. The issue affects the kernel's block layer which handles all block device I/O operations, making it a significant vulnerability for system stability and security (Kernel Git).
The issue was fixed by moving the BIO_THROTTLED flag setting operation inside the queue_lock protected region. The fix was implemented in the Linux kernel and backported to stable kernel versions (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."