Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: writeback: avoid use-after-free after removing device When a disk is removed, bdi_unregister gets called to stop further writeback and wait for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation dwork after this has completed, which can result in the timer attempting to access the just freed bdi_writeback. Fix this by checking if the bdi_writeback is alive, similar to when scheduling writeback work. Since this requires wb->work_lock, and wb_inode_writeback_end() may get called from interrupt, switch wb->work_lock to an irqsafe lock.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.15, < 5.15.64 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7Patch
- https://git.kernel.org/stable/c/f87904c075515f3e1d8f4a7115869d3b914674fdPatch
- https://git.kernel.org/stable/c/f96b9f7c1676923bce871e728bb49c0dfa5013ccPatch
FAQ
What is CVE-2022-49995?
CVE-2022-49995 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: writeback: avoid use-after-free after removing device When a disk is removed, bdi_unregister gets called to stop further writeback...
How severe is CVE-2022-49995?
CVE-2022-49995 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49995?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.