CVE-2022-49220

In the Linux kernel, the following vulnerability has been resolved: dax: make sure inodes are flushed before destroy cache A bug can be triggered by following command $ modprobe nd_pmem && modprobe -r nd_pmem [ 10.060014] BUG dax_cache (Not tainted): Objects remaining in dax_cache on __kmem_cache_shutdown() [ 10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node) [ 10.062433] Call Trace: [ 10.062673] dump_stack_lvl+0x34/0x44 [ 10.062865] slab_err+0x90/0xd0 [ 10.063619] __kmem_cache_shutdown+0x13b/0x2f0 [ 10.063848] kmem_cache_destroy+0x4a/0x110 [ 10.064058] __x64_sys_delete_module+0x265/0x300 This is caused by dax_fs_exit() not flushing inodes before destroy cache. To fix this issue, call rcu_barrier() before destroy cache.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Oct 2025, 11:52

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/770d42fff12d8595adda9025a0b92091f543e775 - () https://git.kernel.org/stable/c/770d42fff12d8595adda9025a0b92091f543e775 - Patch
References () https://git.kernel.org/stable/c/a7e8de822e0b1979f08767c751f6c8a9c1d4ad86 - () https://git.kernel.org/stable/c/a7e8de822e0b1979f08767c751f6c8a9c1d4ad86 - Patch
References () https://git.kernel.org/stable/c/b786abe7c67c6ef71410c8e23292b3091d616ad1 - () https://git.kernel.org/stable/c/b786abe7c67c6ef71410c8e23292b3091d616ad1 - Patch
References () https://git.kernel.org/stable/c/e2951eaa9398415ac054b7bd80b8163b6838ead4 - () https://git.kernel.org/stable/c/e2951eaa9398415ac054b7bd80b8163b6838ead4 - Patch
References () https://git.kernel.org/stable/c/ec376f5c11c88c0215d173599db8449cd4196759 - () https://git.kernel.org/stable/c/ec376f5c11c88c0215d173599db8449cd4196759 - Patch
References () https://git.kernel.org/stable/c/f2a1e0eb70c2d954176c07d75d28742bde30e9f3 - () https://git.kernel.org/stable/c/f2a1e0eb70c2d954176c07d75d28742bde30e9f3 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dax: asegúrese de que los inodos se vacíen antes de destruir la caché. Se puede activar un error con el siguiente comando $ modprobe nd_pmem && modprobe -r nd_pmem [ 10.060014] ERROR dax_cache (no contaminado): objetos restantes en dax_cache en __kmem_cache_shutdown() [ 10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node) [ 10.062433] Seguimiento de llamadas: [ 10.062673] dump_stack_lvl+0x34/0x44 [ 10.062865] slab_err+0x90/0xd0 [ 10.063619] __kmem_cache_shutdown+0x13b/0x2f0 [ 10.063848] kmem_cache_destroy+0x4a/0x110 [ 10.064058] __x64_sys_delete_module+0x265/0x300 Esto se debe a que dax_fs_exit() no vacía los inodos antes de destruir la caché. Para solucionar este problema, llame a rcu_barrier() antes de destruir la caché.

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-10-21 11:52


NVD link : CVE-2022-49220

Mitre link : CVE-2022-49220

CVE.ORG link : CVE-2022-49220


JSON object : View

Products Affected

linux

  • linux_kernel