
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's ublk driver was discovered and assigned CVE-2025-22068. The issue was disclosed on April 16, 2025, and involves improper handling of the ubq->canceling flag when the queue is frozen, which could lead to use-after-free conditions (NVD).
The vulnerability stems from the ublk driver's dependency on ubq->canceling for determining if requests can be dispatched via uring_cmd and io_uring_cmd_complete_in_task(). The issue occurs when the queue is frozen, as the flag needs to be properly set to ensure reliable observation from ublk_queue_rq(). The vulnerability has been assigned a CVSS v3.1 base score of 5.5 with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Red Hat XML).
The vulnerability could result in a use-after-free condition on uring_cmd when the queue is frozen, potentially leading to system instability or denial of service. The CVSS score indicates high availability impact but no direct impact on confidentiality or integrity (Red Hat XML).
The vulnerability has been fixed in various Linux kernel versions. Debian has addressed this in version 6.12.25-1 for sid, while some distributions like Red Hat Enterprise Linux 6, 7, 8, and 9 are not affected by this vulnerability (Debian Tracker, Red Hat XML).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."