
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49673 affects the Linux kernel's device mapper RAID functionality. The vulnerability was discovered in the raid5adddisk function when running the LVM testsuite, specifically during the test lvconvert-raid-reshape-lineartoraid6-single-type.sh. The issue manifests as a KASAN (Kernel Address Sanitizer) warning, indicating potential memory safety issues (Kernel Git).
The vulnerability occurs in the raid5adddisk function within the Linux kernel's device mapper RAID implementation. The issue arises from insufficient boundary checking of the rdev->savedraiddisk value. The fix involves adding additional verification to ensure that rdev->savedraiddisk is within proper limits before proceeding with disk addition operations (Kernel Git).
The vulnerability could potentially lead to memory corruption issues in the Linux kernel's RAID subsystem when adding disks to a RAID array. This specifically affects systems using the device mapper RAID functionality (NVD).
The issue has been fixed by adding a boundary check to verify that rdev->savedraiddisk is within proper limits. The fix has been implemented in the Linux kernel through a patch that adds the condition 'rdev->savedraiddisk <= last' to the existing checks (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."