CVE-2022-49411

In the Linux kernel, the following vulnerability has been resolved: bfq: Make sure bfqg for which we are queueing requests is online Bios queued into BFQ IO scheduler can be associated with a cgroup that was already offlined. This may then cause insertion of this bfq_group into a service tree. But this bfq_group will get freed as soon as last bio associated with it is completed leading to use after free issues for service tree users. Fix the problem by making sure we always operate on online bfq_group. If the bfq_group associated with the bio is not online, we pick the first online parent.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Mar 2025, 13:42

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd - () https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd - Patch
References () https://git.kernel.org/stable/c/51f724bffa3403a5236597e6b75df7329c1ec6e9 - () https://git.kernel.org/stable/c/51f724bffa3403a5236597e6b75df7329c1ec6e9 - Patch
References () https://git.kernel.org/stable/c/6ee0868b0c3ccead5907685fcdcdd0c08dfe4b0b - () https://git.kernel.org/stable/c/6ee0868b0c3ccead5907685fcdcdd0c08dfe4b0b - Patch
References () https://git.kernel.org/stable/c/7781c38552e6cc54ed8e9040279561340516b881 - () https://git.kernel.org/stable/c/7781c38552e6cc54ed8e9040279561340516b881 - Patch
References () https://git.kernel.org/stable/c/97bd6c56bdcb41079e488e31df56809e3b2ce628 - () https://git.kernel.org/stable/c/97bd6c56bdcb41079e488e31df56809e3b2ce628 - Patch
References () https://git.kernel.org/stable/c/ccddf8cd411c1800863ed357064e56ceffd356bb - () https://git.kernel.org/stable/c/ccddf8cd411c1800863ed357064e56ceffd356bb - Patch

05 Mar 2025, 22:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bfq: Asegúrese de que bfqg para el que estamos poniendo en cola las solicitudes esté en línea. Las BIOS en cola en el programador de E/S de BFQ se pueden asociar con un cgroup que ya estaba fuera de línea. Esto puede provocar la inserción de este bfq_group en un árbol de servicios. Pero este bfq_group se liberará tan pronto como se complete la última bio asociada con él, lo que genera problemas de use-after-free para los usuarios del árbol de servicios. Solucione el problema asegurándose de que siempre operamos en bfq_group en línea. Si el bfq_group asociado con la bio no está en línea, elegimos el primer padre en línea.
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-25 13:42


NVD link : CVE-2022-49411

Mitre link : CVE-2022-49411

CVE.ORG link : CVE-2022-49411


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free