In the Linux kernel, the following vulnerability has been resolved:
ublk: make sure ubq->canceling is set when queue is frozen
Now ublk driver depends on `ubq->canceling` for deciding if the request
can be dispatched via uring_cmd & io_uring_cmd_complete_in_task().
Once ubq->canceling is set, the uring_cmd can be done via ublk_cancel_cmd()
and io_uring_cmd_done().
So set ubq->canceling when queue is frozen, this way makes sure that the
flag can be observed from ublk_queue_rq() reliably, and avoids
use-after-free on uring_cmd.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-04-16 15:16
Updated : 2025-10-01 17:15
NVD link : CVE-2025-22068
Mitre link : CVE-2025-22068
CVE.ORG link : CVE-2025-22068
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
