
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-50307 affects the Linux kernel's channel-subsystem-driver functionality. The vulnerability was discovered in the s390/cio component, specifically related to an out-of-bounds access issue when handling the cioignore list. The issue occurs when device-IDs are removed from the cioignore list using commands like 'echo free >/proc/cio_ignore' (NVD).
The vulnerability stems from an optimization introduced in commit 172da89ed0ea that was meant to exclude online devices from device scanning to prevent interference with running I/Os. The issue arises because the check for online devices incorrectly assumes that an I/O-subchannel's drvdata points to a struct iosubchannelprivate. For devices bound to non-default I/O subchannel drivers (like the vfio_ccw driver), this results in an out-of-bounds read access during each scan (NVD).
When exploited, this vulnerability can lead to out-of-bounds read access during device scanning operations, potentially affecting system stability and security. This is particularly relevant for systems using non-default I/O subchannel drivers (NVD).
The fix involves changing the scan logic to rely on a driver-independent online indication using struct subchannel->config.ena, which represents the driver's requested subchannel-enabled state. This approach maintains the original optimization intent since I/Os can only be started on enabled subchannels (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."