CVE-2022-49413: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: bfq: Update cgroup information before merging bio When the process is migrated to a different cgroup (or in case of writeback just starts submitting bios associated with a different cgroup) bfq_merge_bio() can operate with stale cgroup information in bic. Thus the bio can be merged to a request from a different cgroup or it can result in merging of bfqqs for different cgroups or bfqqs of already dead cgroups and causing possible use-after-free issues. Fix the problem by updating cgroup information in bfq_merge_bio().
AI Analysis
Technical Summary
CVE-2022-49413 is a high-severity vulnerability affecting the Linux kernel's BFQ (Budget Fair Queueing) I/O scheduler, specifically related to cgroup (control group) management during bio (block I/O) merging operations. The issue arises when a process migrates between different cgroups or when writeback operations submit bios associated with different cgroups. In such scenarios, the function bfq_merge_bio() may operate using stale or outdated cgroup information stored in the bio information context (bic). This stale information can lead to incorrect merging of bios to requests belonging to different cgroups or merging bfq queues (bfqqs) of different or already dead cgroups. The consequence is a use-after-free condition (CWE-416), where memory that has been freed is accessed again, potentially leading to memory corruption, kernel crashes, or arbitrary code execution within the kernel context. The vulnerability requires local privileges (low attack complexity and privileges) but does not require user interaction. The CVSS 3.1 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, as exploitation could allow an attacker to escalate privileges or cause denial of service. The fix involves updating the cgroup information in bfq_merge_bio() to ensure it always operates with current and valid cgroup data, preventing the use-after-free condition. No known exploits are reported in the wild as of the published date, but the vulnerability's nature and impact warrant prompt attention and patching.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on Linux-based infrastructure, including servers, cloud environments, and embedded systems. Exploitation could allow a local attacker to escalate privileges, potentially gaining root access or causing kernel panics leading to denial of service. This is particularly critical for data centers, financial institutions, healthcare providers, and critical infrastructure operators in Europe, where Linux servers are prevalent. The compromise of confidentiality, integrity, and availability could lead to data breaches, service outages, and compliance violations under regulations such as GDPR. Additionally, the vulnerability could be leveraged in multi-tenant cloud environments common in Europe, where isolation between tenants is enforced via cgroups, increasing the risk of cross-tenant attacks if exploited.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patches that update the bfq_merge_bio() function to correctly refresh cgroup information before merging bios. Until patches are applied, organizations should: 1) Restrict local user access to trusted personnel only, minimizing the risk of exploitation by unprivileged users. 2) Monitor kernel logs and system behavior for anomalies indicative of use-after-free or memory corruption issues. 3) Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation success. 4) In containerized or virtualized environments, enforce strict cgroup and namespace isolation policies and limit capabilities to reduce attack surface. 5) Regularly update Linux distributions to incorporate security fixes promptly. 6) Conduct security audits focusing on privilege escalation vectors and ensure incident response plans include kernel-level compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-49413: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: bfq: Update cgroup information before merging bio When the process is migrated to a different cgroup (or in case of writeback just starts submitting bios associated with a different cgroup) bfq_merge_bio() can operate with stale cgroup information in bic. Thus the bio can be merged to a request from a different cgroup or it can result in merging of bfqqs for different cgroups or bfqqs of already dead cgroups and causing possible use-after-free issues. Fix the problem by updating cgroup information in bfq_merge_bio().
AI-Powered Analysis
Technical Analysis
CVE-2022-49413 is a high-severity vulnerability affecting the Linux kernel's BFQ (Budget Fair Queueing) I/O scheduler, specifically related to cgroup (control group) management during bio (block I/O) merging operations. The issue arises when a process migrates between different cgroups or when writeback operations submit bios associated with different cgroups. In such scenarios, the function bfq_merge_bio() may operate using stale or outdated cgroup information stored in the bio information context (bic). This stale information can lead to incorrect merging of bios to requests belonging to different cgroups or merging bfq queues (bfqqs) of different or already dead cgroups. The consequence is a use-after-free condition (CWE-416), where memory that has been freed is accessed again, potentially leading to memory corruption, kernel crashes, or arbitrary code execution within the kernel context. The vulnerability requires local privileges (low attack complexity and privileges) but does not require user interaction. The CVSS 3.1 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, as exploitation could allow an attacker to escalate privileges or cause denial of service. The fix involves updating the cgroup information in bfq_merge_bio() to ensure it always operates with current and valid cgroup data, preventing the use-after-free condition. No known exploits are reported in the wild as of the published date, but the vulnerability's nature and impact warrant prompt attention and patching.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on Linux-based infrastructure, including servers, cloud environments, and embedded systems. Exploitation could allow a local attacker to escalate privileges, potentially gaining root access or causing kernel panics leading to denial of service. This is particularly critical for data centers, financial institutions, healthcare providers, and critical infrastructure operators in Europe, where Linux servers are prevalent. The compromise of confidentiality, integrity, and availability could lead to data breaches, service outages, and compliance violations under regulations such as GDPR. Additionally, the vulnerability could be leveraged in multi-tenant cloud environments common in Europe, where isolation between tenants is enforced via cgroups, increasing the risk of cross-tenant attacks if exploited.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patches that update the bfq_merge_bio() function to correctly refresh cgroup information before merging bios. Until patches are applied, organizations should: 1) Restrict local user access to trusted personnel only, minimizing the risk of exploitation by unprivileged users. 2) Monitor kernel logs and system behavior for anomalies indicative of use-after-free or memory corruption issues. 3) Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation success. 4) In containerized or virtualized environments, enforce strict cgroup and namespace isolation policies and limit capabilities to reduce attack surface. 5) Regularly update Linux distributions to incorporate security fixes promptly. 6) Conduct security audits focusing on privilege escalation vectors and ensure incident response plans include kernel-level compromise scenarios.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.567Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe594b
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 7/3/2025, 2:57:37 AM
Last updated: 1/7/2026, 6:07:20 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.