First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: bfq: Make sure bfqg for which we are queueing requests is online Bios queued into BFQ IO scheduler can be associated with a cgroup that was already offlined. This may then cause insertion of this bfq_group into a service tree. But this bfq_group will get freed as soon as last bio associated with it is completed leading to use after free issues for service tree users. Fix the problem by making sure we always operate on online bfq_group. If the bfq_group associated with the bio is not online, we pick the first online parent.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.12<5.4.198 | |
Linux Kernel | >=5.5<5.10.121 | |
Linux Kernel | >=5.11<5.15.46 | |
Linux Kernel | >=5.16<5.17.14 | |
Linux Kernel | >=5.18<5.18.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49411 is classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2022-49411, it is recommended to update to the latest version of the Linux kernel where the vulnerability has been patched.
CVE-2022-49411 can potentially lead to unstable behavior in systems using the BFQ I/O scheduler if cgroups are not managed correctly.
CVE-2022-49411 is not considered remotely exploitable as it requires local access to the system.
CVE-2022-49411 affects multiple versions of the Linux kernel prior to the security patches that address this vulnerability.