๐Ÿ” CVE Alert

CVE-2022-50307

UNKNOWN 0.0

s390/cio: fix out-of-bounds access on cio_ignore free

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: s390/cio: fix out-of-bounds access on cio_ignore free The channel-subsystem-driver scans for newly available devices whenever device-IDs are removed from the cio_ignore list using a command such as: echo free >/proc/cio_ignore Since an I/O device scan might interfer with running I/Os, commit 172da89ed0ea ("s390/cio: avoid excessive path-verification requests") introduced an optimization to exclude online devices from the scan. The newly added check for online devices incorrectly assumes that an I/O-subchannel's drvdata points to a struct io_subchannel_private. For devices that are bound to a non-default I/O subchannel driver, such as the vfio_ccw driver, this results in an out-of-bounds read access during each scan. Fix this by changing the scan logic to rely on a driver-independent online indication. For this we can use struct subchannel->config.ena, which is the driver's requested subchannel-enabled state. Since I/Os can only be started on enabled subchannels, this matches the intent of the original optimization of not scanning devices where I/O might be running.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
172da89ed0eaf9d9348f5decb86ad04c624b39d1 < 0e501fd0f38e42304bfa0d46a812d93f80294a87 172da89ed0eaf9d9348f5decb86ad04c624b39d1 < 106ab66cf5467726ca5ead51623043d37c06820a 172da89ed0eaf9d9348f5decb86ad04c624b39d1 < 1b6074112742f65ece71b0f299ca5a6a887d2db6
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0e501fd0f38e42304bfa0d46a812d93f80294a87 git.kernel.org: https://git.kernel.org/stable/c/106ab66cf5467726ca5ead51623043d37c06820a git.kernel.org: https://git.kernel.org/stable/c/1b6074112742f65ece71b0f299ca5a6a887d2db6