CVE-2022-48919: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: cifs: fix double free race when mount fails in cifs_get_root() When cifs_get_root() fails during cifs_smb3_do_mount() we call deactivate_locked_super() which eventually will call delayed_free() which will free the context. In this situation we should not proceed to enter the out: section in cifs_smb3_do_mount() and free the same resources a second time. [Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0 [Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G OE 5.17.0-rc3+ #4 [Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019 [Thu Feb 10 12:59:06 2022] Call Trace: [Thu Feb 10 12:59:06 2022] <IRQ> [Thu Feb 10 12:59:06 2022] dump_stack_lvl+0x5d/0x78 [Thu Feb 10 12:59:06 2022] print_address_description.constprop.0+0x24/0x150 [Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] kasan_report.cold+0x7d/0x117 [Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] __asan_load8+0x86/0xa0 [Thu Feb 10 12:59:06 2022] rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] rcu_core+0x547/0xca0 [Thu Feb 10 12:59:06 2022] ? call_rcu+0x3c0/0x3c0 [Thu Feb 10 12:59:06 2022] ? __this_cpu_preempt_check+0x13/0x20 [Thu Feb 10 12:59:06 2022] ? lock_is_held_type+0xea/0x140 [Thu Feb 10 12:59:06 2022] rcu_core_si+0xe/0x10 [Thu Feb 10 12:59:06 2022] __do_softirq+0x1d4/0x67b [Thu Feb 10 12:59:06 2022] __irq_exit_rcu+0x100/0x150 [Thu Feb 10 12:59:06 2022] irq_exit_rcu+0xe/0x30 [Thu Feb 10 12:59:06 2022] sysvec_hyperv_stimer0+0x9d/0xc0 ... [Thu Feb 10 12:59:07 2022] Freed by task 58179: [Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50 [Thu Feb 10 12:59:07 2022] kasan_set_track+0x25/0x30 [Thu Feb 10 12:59:07 2022] kasan_set_free_info+0x24/0x40 [Thu Feb 10 12:59:07 2022] ____kasan_slab_free+0x137/0x170 [Thu Feb 10 12:59:07 2022] __kasan_slab_free+0x12/0x20 [Thu Feb 10 12:59:07 2022] slab_free_freelist_hook+0xb3/0x1d0 [Thu Feb 10 12:59:07 2022] kfree+0xcd/0x520 [Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0x149/0xbe0 [cifs] [Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs] [Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140 [Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0 [Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210 [Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0 [Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae [Thu Feb 10 12:59:07 2022] Last potentially related work creation: [Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50 [Thu Feb 10 12:59:07 2022] __kasan_record_aux_stack+0xb6/0xc0 [Thu Feb 10 12:59:07 2022] kasan_record_aux_stack_noalloc+0xb/0x10 [Thu Feb 10 12:59:07 2022] call_rcu+0x76/0x3c0 [Thu Feb 10 12:59:07 2022] cifs_umount+0xce/0xe0 [cifs] [Thu Feb 10 12:59:07 2022] cifs_kill_sb+0xc8/0xe0 [cifs] [Thu Feb 10 12:59:07 2022] deactivate_locked_super+0x5d/0xd0 [Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0xab9/0xbe0 [cifs] [Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs] [Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140 [Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0 [Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210 [Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0 [Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae
AI Analysis
Technical Summary
CVE-2022-48919 is a vulnerability in the Linux kernel's CIFS (Common Internet File System) client implementation. The flaw arises from a double free race condition in the function cifs_get_root() during the mount process handled by cifs_smb3_do_mount(). Specifically, when cifs_get_root() fails, the kernel calls deactivate_locked_super(), which eventually triggers delayed_free() to free the context. However, the code erroneously proceeds to an 'out:' section in cifs_smb3_do_mount() that attempts to free the same resources again, leading to a double free. This double free can cause use-after-free conditions, as evidenced by Kernel Address Sanitizer (KASAN) reports showing invalid memory reads and frees in the kernel stack trace. The vulnerability is triggered during the mounting of SMB3 shares via CIFS, which is commonly used for network file sharing in Linux environments. The issue was identified and fixed in Linux kernel versions around 5.17.0-rc3. The vulnerability does not require user interaction but does require the ability to mount CIFS shares, which typically implies local or network-level access. The vulnerability can cause kernel memory corruption, potentially leading to system crashes (denial of service) or, in a worst-case scenario, privilege escalation or arbitrary code execution within the kernel context if exploited successfully. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The patch details are not explicitly provided in the data, but the fix involves preventing the double free by ensuring the code does not proceed to free resources twice after a mount failure.
Potential Impact
For European organizations, the impact of CVE-2022-48919 can be significant, especially for those relying heavily on Linux servers and systems that mount SMB/CIFS shares for file storage and sharing. The vulnerability could be exploited to cause kernel crashes, leading to denial of service on critical infrastructure such as file servers, application servers, or virtual machines running Linux. In environments where attackers have network access to mount CIFS shares or local access to trigger mounts, this vulnerability could be leveraged to escalate privileges or execute arbitrary code in the kernel, compromising system integrity and confidentiality. This is particularly concerning for sectors with sensitive data such as finance, healthcare, and government agencies across Europe. Additionally, Linux is widely used in cloud and virtualized environments; thus, the vulnerability could affect cloud service providers and their customers. The lack of known exploits reduces immediate risk, but the potential for severe impact mandates prompt attention.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately identify and inventory Linux systems using CIFS to mount SMB3 shares, prioritizing servers and virtual machines in critical roles. 2) Apply the latest Linux kernel updates that include the patch for CVE-2022-48919 as soon as they become available from trusted vendors or distributions. 3) Temporarily restrict or disable CIFS mounts where feasible, especially on systems exposed to untrusted networks, until patches are applied. 4) Monitor system logs for kernel errors or crashes related to CIFS mounts that may indicate attempted exploitation. 5) Implement network segmentation to limit access to CIFS services only to trusted hosts and users. 6) Employ kernel hardening and exploit mitigation techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. 7) Educate system administrators about the risks of mounting SMB shares and enforce strict access controls and authentication mechanisms for mounting operations. 8) For virtualized environments, ensure hypervisor and guest OS isolation to reduce risk of lateral movement if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-48919: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: cifs: fix double free race when mount fails in cifs_get_root() When cifs_get_root() fails during cifs_smb3_do_mount() we call deactivate_locked_super() which eventually will call delayed_free() which will free the context. In this situation we should not proceed to enter the out: section in cifs_smb3_do_mount() and free the same resources a second time. [Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0 [Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G OE 5.17.0-rc3+ #4 [Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019 [Thu Feb 10 12:59:06 2022] Call Trace: [Thu Feb 10 12:59:06 2022] <IRQ> [Thu Feb 10 12:59:06 2022] dump_stack_lvl+0x5d/0x78 [Thu Feb 10 12:59:06 2022] print_address_description.constprop.0+0x24/0x150 [Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] kasan_report.cold+0x7d/0x117 [Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] __asan_load8+0x86/0xa0 [Thu Feb 10 12:59:06 2022] rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] rcu_core+0x547/0xca0 [Thu Feb 10 12:59:06 2022] ? call_rcu+0x3c0/0x3c0 [Thu Feb 10 12:59:06 2022] ? __this_cpu_preempt_check+0x13/0x20 [Thu Feb 10 12:59:06 2022] ? lock_is_held_type+0xea/0x140 [Thu Feb 10 12:59:06 2022] rcu_core_si+0xe/0x10 [Thu Feb 10 12:59:06 2022] __do_softirq+0x1d4/0x67b [Thu Feb 10 12:59:06 2022] __irq_exit_rcu+0x100/0x150 [Thu Feb 10 12:59:06 2022] irq_exit_rcu+0xe/0x30 [Thu Feb 10 12:59:06 2022] sysvec_hyperv_stimer0+0x9d/0xc0 ... [Thu Feb 10 12:59:07 2022] Freed by task 58179: [Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50 [Thu Feb 10 12:59:07 2022] kasan_set_track+0x25/0x30 [Thu Feb 10 12:59:07 2022] kasan_set_free_info+0x24/0x40 [Thu Feb 10 12:59:07 2022] ____kasan_slab_free+0x137/0x170 [Thu Feb 10 12:59:07 2022] __kasan_slab_free+0x12/0x20 [Thu Feb 10 12:59:07 2022] slab_free_freelist_hook+0xb3/0x1d0 [Thu Feb 10 12:59:07 2022] kfree+0xcd/0x520 [Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0x149/0xbe0 [cifs] [Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs] [Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140 [Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0 [Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210 [Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0 [Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae [Thu Feb 10 12:59:07 2022] Last potentially related work creation: [Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50 [Thu Feb 10 12:59:07 2022] __kasan_record_aux_stack+0xb6/0xc0 [Thu Feb 10 12:59:07 2022] kasan_record_aux_stack_noalloc+0xb/0x10 [Thu Feb 10 12:59:07 2022] call_rcu+0x76/0x3c0 [Thu Feb 10 12:59:07 2022] cifs_umount+0xce/0xe0 [cifs] [Thu Feb 10 12:59:07 2022] cifs_kill_sb+0xc8/0xe0 [cifs] [Thu Feb 10 12:59:07 2022] deactivate_locked_super+0x5d/0xd0 [Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0xab9/0xbe0 [cifs] [Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs] [Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140 [Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0 [Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210 [Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0 [Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae
AI-Powered Analysis
Technical Analysis
CVE-2022-48919 is a vulnerability in the Linux kernel's CIFS (Common Internet File System) client implementation. The flaw arises from a double free race condition in the function cifs_get_root() during the mount process handled by cifs_smb3_do_mount(). Specifically, when cifs_get_root() fails, the kernel calls deactivate_locked_super(), which eventually triggers delayed_free() to free the context. However, the code erroneously proceeds to an 'out:' section in cifs_smb3_do_mount() that attempts to free the same resources again, leading to a double free. This double free can cause use-after-free conditions, as evidenced by Kernel Address Sanitizer (KASAN) reports showing invalid memory reads and frees in the kernel stack trace. The vulnerability is triggered during the mounting of SMB3 shares via CIFS, which is commonly used for network file sharing in Linux environments. The issue was identified and fixed in Linux kernel versions around 5.17.0-rc3. The vulnerability does not require user interaction but does require the ability to mount CIFS shares, which typically implies local or network-level access. The vulnerability can cause kernel memory corruption, potentially leading to system crashes (denial of service) or, in a worst-case scenario, privilege escalation or arbitrary code execution within the kernel context if exploited successfully. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The patch details are not explicitly provided in the data, but the fix involves preventing the double free by ensuring the code does not proceed to free resources twice after a mount failure.
Potential Impact
For European organizations, the impact of CVE-2022-48919 can be significant, especially for those relying heavily on Linux servers and systems that mount SMB/CIFS shares for file storage and sharing. The vulnerability could be exploited to cause kernel crashes, leading to denial of service on critical infrastructure such as file servers, application servers, or virtual machines running Linux. In environments where attackers have network access to mount CIFS shares or local access to trigger mounts, this vulnerability could be leveraged to escalate privileges or execute arbitrary code in the kernel, compromising system integrity and confidentiality. This is particularly concerning for sectors with sensitive data such as finance, healthcare, and government agencies across Europe. Additionally, Linux is widely used in cloud and virtualized environments; thus, the vulnerability could affect cloud service providers and their customers. The lack of known exploits reduces immediate risk, but the potential for severe impact mandates prompt attention.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately identify and inventory Linux systems using CIFS to mount SMB3 shares, prioritizing servers and virtual machines in critical roles. 2) Apply the latest Linux kernel updates that include the patch for CVE-2022-48919 as soon as they become available from trusted vendors or distributions. 3) Temporarily restrict or disable CIFS mounts where feasible, especially on systems exposed to untrusted networks, until patches are applied. 4) Monitor system logs for kernel errors or crashes related to CIFS mounts that may indicate attempted exploitation. 5) Implement network segmentation to limit access to CIFS services only to trusted hosts and users. 6) Employ kernel hardening and exploit mitigation techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. 7) Educate system administrators about the risks of mounting SMB shares and enforce strict access controls and authentication mechanisms for mounting operations. 8) For virtualized environments, ensure hypervisor and guest OS isolation to reduce risk of lateral movement if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-21T06:06:23.295Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe65bb
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 6/30/2025, 11:42:10 PM
Last updated: 8/12/2025, 7:49:48 PM
Views: 8
Related Threats
CVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.