CVE-2022-49720: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: block: Fix handling of offline queues in blk_mq_alloc_request_hctx() This patch prevents that test nvme/004 triggers the following: UBSAN: array-index-out-of-bounds in block/blk-mq.h:135:9 index 512 is out of range for type 'long unsigned int [512]' Call Trace: show_stack+0x52/0x58 dump_stack_lvl+0x49/0x5e dump_stack+0x10/0x12 ubsan_epilogue+0x9/0x3b __ubsan_handle_out_of_bounds.cold+0x44/0x49 blk_mq_alloc_request_hctx+0x304/0x310 __nvme_submit_sync_cmd+0x70/0x200 [nvme_core] nvmf_connect_io_queue+0x23e/0x2a0 [nvme_fabrics] nvme_loop_connect_io_queues+0x8d/0xb0 [nvme_loop] nvme_loop_create_ctrl+0x58e/0x7d0 [nvme_loop] nvmf_create_ctrl+0x1d7/0x4d0 [nvme_fabrics] nvmf_dev_write+0xae/0x111 [nvme_fabrics] vfs_write+0x144/0x560 ksys_write+0xb7/0x140 __x64_sys_write+0x42/0x50 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae
AI Analysis
Technical Summary
CVE-2022-49720 is a vulnerability identified in the Linux kernel's block layer, specifically related to the handling of offline queues in the blk_mq_alloc_request_hctx() function. The issue arises due to improper bounds checking that leads to an out-of-bounds array access, as indicated by the UBSAN (Undefined Behavior Sanitizer) error triggered during testing: an index of 512 is accessed on an array of size 512, which is out of range. This vulnerability is rooted in the multi-queue block layer (blk-mq), which is responsible for managing I/O request queues to storage devices. The flaw manifests when the kernel attempts to allocate requests for offline queues, potentially leading to memory corruption or kernel crashes. The call trace shows involvement of NVMe-related subsystems (nvme_core, nvme_fabrics, nvme_loop), indicating that the vulnerability could be triggered during NVMe device operations, particularly when connecting or creating NVMe controller queues. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged to cause denial of service (via kernel panic or crash) or potentially escalate privileges if exploited in conjunction with other vulnerabilities. The patch fixes the handling of offline queues to prevent out-of-bounds access. The affected versions are identified by specific kernel commit hashes, suggesting this is a recent and targeted fix in the Linux kernel source code. No CVSS score has been assigned yet, and no public exploit code is available at this time.
Potential Impact
For European organizations, the impact of CVE-2022-49720 primarily revolves around system stability and security of Linux-based infrastructure, especially those utilizing NVMe storage devices. Many enterprise servers, cloud platforms, and data centers in Europe rely heavily on Linux kernels for their operations. A successful exploitation could lead to kernel crashes, resulting in denial of service and potential disruption of critical services. In environments where NVMe storage is prevalent, such as high-performance computing, financial services, telecommunications, and cloud providers, the risk is more pronounced. While direct privilege escalation is not confirmed, the memory corruption potential could be a stepping stone for attackers to gain elevated access, threatening confidentiality and integrity of data. Additionally, disruption in storage I/O could affect availability of applications and services, impacting business continuity. Given the absence of known exploits, the immediate threat level is moderate, but the vulnerability should be treated seriously due to the kernel-level impact and the widespread use of Linux in European IT infrastructure.
Mitigation Recommendations
1. Immediate application of the official Linux kernel patch that addresses the offline queue handling in blk_mq_alloc_request_hctx() is critical. Organizations should track kernel updates from trusted Linux distributions and apply security patches promptly. 2. For environments where immediate patching is challenging, consider temporarily disabling or limiting NVMe device usage or isolating affected systems to reduce exposure. 3. Implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and use of security modules like SELinux or AppArmor to reduce the risk of exploitation. 4. Monitor system logs and kernel messages for unusual behavior related to block device operations or NVMe queue creation failures that could indicate attempted exploitation. 5. Employ rigorous testing and validation of kernel updates in staging environments before deployment to production to ensure stability and compatibility. 6. Maintain up-to-date backups and disaster recovery plans to mitigate the impact of potential denial of service incidents. 7. Engage with Linux vendor security advisories and subscribe to vulnerability feeds to stay informed about any emerging exploits or additional patches related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-49720: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: block: Fix handling of offline queues in blk_mq_alloc_request_hctx() This patch prevents that test nvme/004 triggers the following: UBSAN: array-index-out-of-bounds in block/blk-mq.h:135:9 index 512 is out of range for type 'long unsigned int [512]' Call Trace: show_stack+0x52/0x58 dump_stack_lvl+0x49/0x5e dump_stack+0x10/0x12 ubsan_epilogue+0x9/0x3b __ubsan_handle_out_of_bounds.cold+0x44/0x49 blk_mq_alloc_request_hctx+0x304/0x310 __nvme_submit_sync_cmd+0x70/0x200 [nvme_core] nvmf_connect_io_queue+0x23e/0x2a0 [nvme_fabrics] nvme_loop_connect_io_queues+0x8d/0xb0 [nvme_loop] nvme_loop_create_ctrl+0x58e/0x7d0 [nvme_loop] nvmf_create_ctrl+0x1d7/0x4d0 [nvme_fabrics] nvmf_dev_write+0xae/0x111 [nvme_fabrics] vfs_write+0x144/0x560 ksys_write+0xb7/0x140 __x64_sys_write+0x42/0x50 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae
AI-Powered Analysis
Technical Analysis
CVE-2022-49720 is a vulnerability identified in the Linux kernel's block layer, specifically related to the handling of offline queues in the blk_mq_alloc_request_hctx() function. The issue arises due to improper bounds checking that leads to an out-of-bounds array access, as indicated by the UBSAN (Undefined Behavior Sanitizer) error triggered during testing: an index of 512 is accessed on an array of size 512, which is out of range. This vulnerability is rooted in the multi-queue block layer (blk-mq), which is responsible for managing I/O request queues to storage devices. The flaw manifests when the kernel attempts to allocate requests for offline queues, potentially leading to memory corruption or kernel crashes. The call trace shows involvement of NVMe-related subsystems (nvme_core, nvme_fabrics, nvme_loop), indicating that the vulnerability could be triggered during NVMe device operations, particularly when connecting or creating NVMe controller queues. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged to cause denial of service (via kernel panic or crash) or potentially escalate privileges if exploited in conjunction with other vulnerabilities. The patch fixes the handling of offline queues to prevent out-of-bounds access. The affected versions are identified by specific kernel commit hashes, suggesting this is a recent and targeted fix in the Linux kernel source code. No CVSS score has been assigned yet, and no public exploit code is available at this time.
Potential Impact
For European organizations, the impact of CVE-2022-49720 primarily revolves around system stability and security of Linux-based infrastructure, especially those utilizing NVMe storage devices. Many enterprise servers, cloud platforms, and data centers in Europe rely heavily on Linux kernels for their operations. A successful exploitation could lead to kernel crashes, resulting in denial of service and potential disruption of critical services. In environments where NVMe storage is prevalent, such as high-performance computing, financial services, telecommunications, and cloud providers, the risk is more pronounced. While direct privilege escalation is not confirmed, the memory corruption potential could be a stepping stone for attackers to gain elevated access, threatening confidentiality and integrity of data. Additionally, disruption in storage I/O could affect availability of applications and services, impacting business continuity. Given the absence of known exploits, the immediate threat level is moderate, but the vulnerability should be treated seriously due to the kernel-level impact and the widespread use of Linux in European IT infrastructure.
Mitigation Recommendations
1. Immediate application of the official Linux kernel patch that addresses the offline queue handling in blk_mq_alloc_request_hctx() is critical. Organizations should track kernel updates from trusted Linux distributions and apply security patches promptly. 2. For environments where immediate patching is challenging, consider temporarily disabling or limiting NVMe device usage or isolating affected systems to reduce exposure. 3. Implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and use of security modules like SELinux or AppArmor to reduce the risk of exploitation. 4. Monitor system logs and kernel messages for unusual behavior related to block device operations or NVMe queue creation failures that could indicate attempted exploitation. 5. Employ rigorous testing and validation of kernel updates in staging environments before deployment to production to ensure stability and compatibility. 6. Maintain up-to-date backups and disaster recovery plans to mitigate the impact of potential denial of service incidents. 7. Engage with Linux vendor security advisories and subscribe to vulnerability feeds to stay informed about any emerging exploits or additional patches related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.445Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4946
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:40:57 AM
Last updated: 7/26/2025, 2:27:12 PM
Views: 8
Related Threats
CVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighCVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.