CVE-2022-49220 (GCVE-0-2022-49220)
Vulnerability from cvelistv5
Published
2025-02-26 01:55
Modified
2025-05-04 08:32
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: dax: make sure inodes are flushed before destroy cache A bug can be triggered by following command $ modprobe nd_pmem && modprobe -r nd_pmem [ 10.060014] BUG dax_cache (Not tainted): Objects remaining in dax_cache on __kmem_cache_shutdown() [ 10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node) [ 10.062433] Call Trace: [ 10.062673] dump_stack_lvl+0x34/0x44 [ 10.062865] slab_err+0x90/0xd0 [ 10.063619] __kmem_cache_shutdown+0x13b/0x2f0 [ 10.063848] kmem_cache_destroy+0x4a/0x110 [ 10.064058] __x64_sys_delete_module+0x265/0x300 This is caused by dax_fs_exit() not flushing inodes before destroy cache. To fix this issue, call rcu_barrier() before destroy cache.
Impacted products
Vendor Product Version
Linux Linux Version: 7b6be8444e0f0dd675b54d059793423d3c9b4c03
Version: 7b6be8444e0f0dd675b54d059793423d3c9b4c03
Version: 7b6be8444e0f0dd675b54d059793423d3c9b4c03
Version: 7b6be8444e0f0dd675b54d059793423d3c9b4c03
Version: 7b6be8444e0f0dd675b54d059793423d3c9b4c03
Version: 7b6be8444e0f0dd675b54d059793423d3c9b4c03
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/dax/super.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "770d42fff12d8595adda9025a0b92091f543e775",
              "status": "affected",
              "version": "7b6be8444e0f0dd675b54d059793423d3c9b4c03",
              "versionType": "git"
            },
            {
              "lessThan": "ec376f5c11c88c0215d173599db8449cd4196759",
              "status": "affected",
              "version": "7b6be8444e0f0dd675b54d059793423d3c9b4c03",
              "versionType": "git"
            },
            {
              "lessThan": "e2951eaa9398415ac054b7bd80b8163b6838ead4",
              "status": "affected",
              "version": "7b6be8444e0f0dd675b54d059793423d3c9b4c03",
              "versionType": "git"
            },
            {
              "lessThan": "f2a1e0eb70c2d954176c07d75d28742bde30e9f3",
              "status": "affected",
              "version": "7b6be8444e0f0dd675b54d059793423d3c9b4c03",
              "versionType": "git"
            },
            {
              "lessThan": "b786abe7c67c6ef71410c8e23292b3091d616ad1",
              "status": "affected",
              "version": "7b6be8444e0f0dd675b54d059793423d3c9b4c03",
              "versionType": "git"
            },
            {
              "lessThan": "a7e8de822e0b1979f08767c751f6c8a9c1d4ad86",
              "status": "affected",
              "version": "7b6be8444e0f0dd675b54d059793423d3c9b4c03",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/dax/super.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.12"
            },
            {
              "lessThan": "4.12",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.189",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.110",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.33",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.16.*",
              "status": "unaffected",
              "version": "5.16.19",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.17.*",
              "status": "unaffected",
              "version": "5.17.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.18",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.189",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.110",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.33",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.16.19",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.17.2",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.18",
                  "versionStartIncluding": "4.12",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndax: make sure inodes are flushed before destroy cache\n\nA bug can be triggered by following command\n\n$ modprobe nd_pmem \u0026\u0026 modprobe -r nd_pmem\n\n[   10.060014] BUG dax_cache (Not tainted): Objects remaining in dax_cache on __kmem_cache_shutdown()\n[   10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node)\n[   10.062433] Call Trace:\n[   10.062673]  dump_stack_lvl+0x34/0x44\n[   10.062865]  slab_err+0x90/0xd0\n[   10.063619]  __kmem_cache_shutdown+0x13b/0x2f0\n[   10.063848]  kmem_cache_destroy+0x4a/0x110\n[   10.064058]  __x64_sys_delete_module+0x265/0x300\n\nThis is caused by dax_fs_exit() not flushing inodes before destroy cache.\nTo fix this issue, call rcu_barrier() before destroy cache."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T08:32:44.211Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/770d42fff12d8595adda9025a0b92091f543e775"
        },
        {
          "url": "https://git.kernel.org/stable/c/ec376f5c11c88c0215d173599db8449cd4196759"
        },
        {
          "url": "https://git.kernel.org/stable/c/e2951eaa9398415ac054b7bd80b8163b6838ead4"
        },
        {
          "url": "https://git.kernel.org/stable/c/f2a1e0eb70c2d954176c07d75d28742bde30e9f3"
        },
        {
          "url": "https://git.kernel.org/stable/c/b786abe7c67c6ef71410c8e23292b3091d616ad1"
        },
        {
          "url": "https://git.kernel.org/stable/c/a7e8de822e0b1979f08767c751f6c8a9c1d4ad86"
        }
      ],
      "title": "dax: make sure inodes are flushed before destroy cache",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-49220",
    "datePublished": "2025-02-26T01:55:52.821Z",
    "dateReserved": "2025-02-26T01:49:39.292Z",
    "dateUpdated": "2025-05-04T08:32:44.211Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-49220\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-26T07:00:59.070\",\"lastModified\":\"2025-02-26T07:00:59.070\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndax: make sure inodes are flushed before destroy cache\\n\\nA bug can be triggered by following command\\n\\n$ modprobe nd_pmem \u0026\u0026 modprobe -r nd_pmem\\n\\n[   10.060014] BUG dax_cache (Not tainted): Objects remaining in dax_cache on __kmem_cache_shutdown()\\n[   10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node)\\n[   10.062433] Call Trace:\\n[   10.062673]  dump_stack_lvl+0x34/0x44\\n[   10.062865]  slab_err+0x90/0xd0\\n[   10.063619]  __kmem_cache_shutdown+0x13b/0x2f0\\n[   10.063848]  kmem_cache_destroy+0x4a/0x110\\n[   10.064058]  __x64_sys_delete_module+0x265/0x300\\n\\nThis is caused by dax_fs_exit() not flushing inodes before destroy cache.\\nTo fix this issue, call rcu_barrier() before destroy cache.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dax: aseg\u00farese de que los inodos se vac\u00eden antes de destruir la cach\u00e9. Se puede activar un error con el siguiente comando $ modprobe nd_pmem \u0026amp;\u0026amp; modprobe -r nd_pmem [ 10.060014] ERROR dax_cache (no contaminado): objetos restantes en dax_cache en __kmem_cache_shutdown() [ 10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node) [ 10.062433] Seguimiento de llamadas: [ 10.062673] dump_stack_lvl+0x34/0x44 [ 10.062865] slab_err+0x90/0xd0 [ 10.063619] __kmem_cache_shutdown+0x13b/0x2f0 [ 10.063848] kmem_cache_destroy+0x4a/0x110 [ 10.064058] __x64_sys_delete_module+0x265/0x300 Esto se debe a que dax_fs_exit() no vac\u00eda los inodos antes de destruir la cach\u00e9. Para solucionar este problema, llame a rcu_barrier() antes de destruir la cach\u00e9.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/770d42fff12d8595adda9025a0b92091f543e775\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a7e8de822e0b1979f08767c751f6c8a9c1d4ad86\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b786abe7c67c6ef71410c8e23292b3091d616ad1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e2951eaa9398415ac054b7bd80b8163b6838ead4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ec376f5c11c88c0215d173599db8449cd4196759\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f2a1e0eb70c2d954176c07d75d28742bde30e9f3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…