CVE-2022-49377: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx blk_mq_run_hw_queues() could be run when there isn't queued request and after queue is cleaned up, at that time tagset is freed, because tagset lifetime is covered by driver, and often freed after blk_cleanup_queue() returns. So don't touch ->tagset for figuring out current default hctx by the mapping built in request queue, so use-after-free on tagset can be avoided. Meantime this way should be fast than retrieving mapping from tagset.
AI Analysis
Technical Summary
CVE-2022-49377 is a high-severity use-after-free vulnerability in the Linux kernel's block multi-queue (blk-mq) subsystem. The blk-mq subsystem is responsible for managing block device I/O queues efficiently by distributing requests across multiple hardware queues. The vulnerability arises in the function blk_mq_run_hw_queues(), which can be invoked even when there are no queued requests and after the request queue has been cleaned up. During this state, the 'tagset' pointer, which is managed by the device driver and typically freed after blk_cleanup_queue() returns, may be accessed. The Linux kernel code previously attempted to access the 'tagset' to determine the current default hardware context (hctx) by using a mapping built in the request queue. However, because the 'tagset' may have been freed, this results in a use-after-free condition (CWE-416). This flaw can lead to memory corruption, potentially allowing an attacker with limited privileges (local access with low privileges) to escalate their privileges, cause denial of service through kernel crashes, or execute arbitrary code within the kernel context. The fix involves avoiding touching the 'tagset' pointer and instead using a safer and faster method to retrieve the current default hctx without relying on the freed memory. The vulnerability has a CVSS 3.1 score of 7.8, indicating high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to environments running Linux kernels with the affected blk-mq implementation, which includes many enterprise servers, cloud infrastructure, and embedded systems. Exploitation could allow attackers with local access to escalate privileges to root, potentially leading to full system compromise. This could result in unauthorized data access, data manipulation, or disruption of critical services. Given the widespread use of Linux in European data centers, telecommunications, government, and industrial control systems, successful exploitation could impact confidentiality of sensitive data, integrity of critical operations, and availability of services. The vulnerability is particularly concerning for multi-tenant cloud providers and hosting services common in Europe, where a compromised virtual machine or container could be leveraged to attack the underlying host kernel. Additionally, industries relying on Linux-based embedded devices (e.g., manufacturing, automotive) could face operational disruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, as the vulnerability is publicly disclosed and could be weaponized by attackers.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions as soon as vendor updates become available, ensuring the fix that avoids use-after-free on the 'tagset' pointer is applied. In environments where immediate patching is not feasible, organizations should implement strict access controls to limit local user privileges and restrict untrusted users from executing code or commands on vulnerable systems. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and enabling security modules like SELinux or AppArmor can reduce exploitation likelihood. Monitoring system logs and kernel crash reports for anomalies related to blk-mq operations can help detect attempted exploitation. For cloud providers, isolating tenants and using virtualization security best practices can mitigate lateral movement risks. Regularly auditing and updating Linux distributions to supported versions with security patches is essential. Finally, organizations should maintain incident response readiness to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Finland
CVE-2022-49377: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx blk_mq_run_hw_queues() could be run when there isn't queued request and after queue is cleaned up, at that time tagset is freed, because tagset lifetime is covered by driver, and often freed after blk_cleanup_queue() returns. So don't touch ->tagset for figuring out current default hctx by the mapping built in request queue, so use-after-free on tagset can be avoided. Meantime this way should be fast than retrieving mapping from tagset.
AI-Powered Analysis
Technical Analysis
CVE-2022-49377 is a high-severity use-after-free vulnerability in the Linux kernel's block multi-queue (blk-mq) subsystem. The blk-mq subsystem is responsible for managing block device I/O queues efficiently by distributing requests across multiple hardware queues. The vulnerability arises in the function blk_mq_run_hw_queues(), which can be invoked even when there are no queued requests and after the request queue has been cleaned up. During this state, the 'tagset' pointer, which is managed by the device driver and typically freed after blk_cleanup_queue() returns, may be accessed. The Linux kernel code previously attempted to access the 'tagset' to determine the current default hardware context (hctx) by using a mapping built in the request queue. However, because the 'tagset' may have been freed, this results in a use-after-free condition (CWE-416). This flaw can lead to memory corruption, potentially allowing an attacker with limited privileges (local access with low privileges) to escalate their privileges, cause denial of service through kernel crashes, or execute arbitrary code within the kernel context. The fix involves avoiding touching the 'tagset' pointer and instead using a safer and faster method to retrieve the current default hctx without relying on the freed memory. The vulnerability has a CVSS 3.1 score of 7.8, indicating high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to environments running Linux kernels with the affected blk-mq implementation, which includes many enterprise servers, cloud infrastructure, and embedded systems. Exploitation could allow attackers with local access to escalate privileges to root, potentially leading to full system compromise. This could result in unauthorized data access, data manipulation, or disruption of critical services. Given the widespread use of Linux in European data centers, telecommunications, government, and industrial control systems, successful exploitation could impact confidentiality of sensitive data, integrity of critical operations, and availability of services. The vulnerability is particularly concerning for multi-tenant cloud providers and hosting services common in Europe, where a compromised virtual machine or container could be leveraged to attack the underlying host kernel. Additionally, industries relying on Linux-based embedded devices (e.g., manufacturing, automotive) could face operational disruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, as the vulnerability is publicly disclosed and could be weaponized by attackers.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions as soon as vendor updates become available, ensuring the fix that avoids use-after-free on the 'tagset' pointer is applied. In environments where immediate patching is not feasible, organizations should implement strict access controls to limit local user privileges and restrict untrusted users from executing code or commands on vulnerable systems. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and enabling security modules like SELinux or AppArmor can reduce exploitation likelihood. Monitoring system logs and kernel crash reports for anomalies related to blk-mq operations can help detect attempted exploitation. For cloud providers, isolating tenants and using virtualization security best practices can mitigate lateral movement risks. Regularly auditing and updating Linux distributions to supported versions with security patches is essential. Finally, organizations should maintain incident response readiness to quickly address any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.558Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe584b
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 7/3/2025, 2:56:32 AM
Last updated: 7/31/2025, 3:22:50 PM
Views: 12
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.