In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq
Commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'")
will access 'bic->bfqq' in bic_set_bfqq(), however, bfq_exit_icq_bfqq()
can free bfqq first, and then call bic_set_bfqq(), which will cause uaf.
Fix the problem by moving bfq_exit_bfqq() behind bic_set_bfqq().
References
Configurations
Configuration 1 (hide)
|
History
04 Dec 2025, 13:43
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-416 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0.16:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15.86:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1.2:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://git.kernel.org/stable/c/1425f1bb5df5239021fd09ebc2a5e8070e705d36 - Patch | |
| References | () https://git.kernel.org/stable/c/1ed959fef5b1c6f1a7a3fbea543698c30ebd6678 - Patch | |
| References | () https://git.kernel.org/stable/c/246cf66e300b76099b5dbd3fdd39e9a5dbc53f02 - Patch | |
| References | () https://git.kernel.org/stable/c/7949b0df3dd9f4817ed4a4e989fa9ee81df6205f - Patch | |
| References | () https://git.kernel.org/stable/c/cfe5b38c37720313eff0dec5517442c7ab3c9a20 - Patch |
15 Sep 2025, 15:22
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-15 15:15
Updated : 2025-12-04 13:43
NVD link : CVE-2022-50329
Mitre link : CVE-2022-50329
CVE.ORG link : CVE-2022-50329
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
