In the Linux kernel, the following vulnerability has been resolved:
ublk: make sure ubq->canceling is set when queue is frozen
Now ublk driver depends on `ubq->canceling` for deciding if the request
can be dispatched via uring_cmd & io_uring_cmd_complete_in_task().
Once ubq->canceling is set, the uring_cmd can be done via ublk_cancel_cmd()
and io_uring_cmd_done().
So set ubq->canceling when queue is frozen, this way makes sure that the
flag can be observed from ublk_queue_rq() reliably, and avoids
use-after-free on uring_cmd.
References
Configurations
Configuration 1 (hide)
|
History
06 May 2025, 16:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://git.kernel.org/stable/c/5491400589e7572c2d2627ed6384302f7672aa1d - Patch | |
References | () https://git.kernel.org/stable/c/7e3497d7dacb5aee69dd9be842b778083cae0e75 - Patch | |
References | () https://git.kernel.org/stable/c/8741d0737921ec1c03cf59aebf4d01400c2b461a - Patch | |
References | () https://git.kernel.org/stable/c/9158359015f0eda00e521e35b7bc7ebce176aebf - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
16 Apr 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-16 15:16
Updated : 2025-05-06 16:40
NVD link : CVE-2025-22068
Mitre link : CVE-2025-22068
CVE.ORG link : CVE-2025-22068
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free