SB20250620192 - Buffer overflow in Linux kernel block
Published: June 20, 2025 Updated: June 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2022-50086)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the wbt_init() function in block/blk-wbt.c, within the blk_iolatency_init() function in block/blk-iolatency.c, within the blk_iocost_init() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/08ef66e800a85afc6b54cb95841f6502627eee2e
- https://git.kernel.org/stable/c/0b7f5d7a4d2a72ad9de04ab8ccba2a31904aa638
- https://git.kernel.org/stable/c/0c9bb1acd1d103a3070b2126870eb52761d606ce
- https://git.kernel.org/stable/c/14a6e2eb7df5c7897c15b109cba29ab0c4a791b6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.61
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0