CVE-2022-50580
Description
In the Linux kernel, the following vulnerability has been resolved:
blk-throttle: prevent overflow while calculating wait time
There is a problem found by code review in tg_with_in_bps_limit() that 'bps_limit * jiffy_elapsed_rnd' might overflow. Fix the problem by calling mul_u64_u64_div_u64() instead.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Integer overflow in Linux kernel's blk-throttle wait-time calculation could allow bypassing I/O bandwidth limits; fixed by using mul_u64_u64_div_u64.
A potential integer overflow vulnerability was discovered during a code review in the Linux kernel's block layer throttling implementation. Specifically, in the function tg_with_in_bps_limit(), the multiplication bps_limit * jiffy_elapsed_rnd could overflow, leading to an incorrect wait time calculation. This issue is fixed by replacing the direct multiplication with the safer helper mul_u64_u64_div_u64(), which handles large values without overflow.
The overflow occurs when the product of the byte-per-second limit and the elapsed time in jiffies exceeds the maximum value representable by a 64-bit integer. Since both values can be large under high I/O loads or long observation windows, the resulting overflow could cause the computed wait time to be smaller than intended, potentially allowing a process to exceed its configured bandwidth throttle.
An attacker with the ability to generate significant I/O activity and influence the timing of throttle calculations could exploit this to bypass I/O bandwidth limits. However, the issue was identified through static analysis, and there is no evidence of active exploitation in the wild. The vulnerability is present in kernel versions prior to the inclusion of the fix commits.
The fix has been applied to the Linux kernel stable tree via commits [1] and [2]. Users are advised to update to the latest stable kernel versions that contain these patches. No workarounds are known, as the issue is resolved by the code change.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
519c010ae44f070b2adb1d698cc6f0855bf8dca67b0563b398d6bbaada2e0Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/19c010ae44f0ce52b5436080492a61a092ee0cf4nvd
- git.kernel.org/stable/c/70b2adb1d698fbc63d3b3848c452524dc15872c5nvd
- git.kernel.org/stable/c/8d6bbaada2e0a65f9012ac4c2506460160e7237anvd
- git.kernel.org/stable/c/ca67b0563b39e79290c23e509319c178b9ca9104nvd
- git.kernel.org/stable/c/cc6f0855bf8d9b729df28ff443ced7350c380dbdnvd
News mentions
0No linked articles in our index yet.