CVE-2022-49316

In the Linux kernel, the following vulnerability has been resolved: NFSv4: Don't hold the layoutget locks across multiple RPC calls When doing layoutget as part of the open() compound, we have to be careful to release the layout locks before we can call any further RPC calls, such as setattr(). The reason is that those calls could trigger a recall, which could deadlock.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 22:01

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSv4: No mantenga los bloqueos layoutget en múltiples llamadas RPC Al realizar layoutget como parte del compuesto open(), debemos tener cuidado de liberar los bloqueos layout antes de poder realizar más llamadas RPC, como setattr(). La razón es que esas llamadas podrían activar una recuperación, lo que podría generar un bloqueo.
References () https://git.kernel.org/stable/c/08d7a26d115cc7892668baa9750f64bd8baca29b - () https://git.kernel.org/stable/c/08d7a26d115cc7892668baa9750f64bd8baca29b - Patch
References () https://git.kernel.org/stable/c/0ee5b9644f06b4d3cdcd9544f43f63312e425a4c - () https://git.kernel.org/stable/c/0ee5b9644f06b4d3cdcd9544f43f63312e425a4c - Patch
References () https://git.kernel.org/stable/c/6949493884fe88500de4af182588e071cf1544ee - () https://git.kernel.org/stable/c/6949493884fe88500de4af182588e071cf1544ee - Patch
References () https://git.kernel.org/stable/c/6b3fc1496e7227cd6a39a80bbfb7588ef7c7a010 - () https://git.kernel.org/stable/c/6b3fc1496e7227cd6a39a80bbfb7588ef7c7a010 - Patch
References () https://git.kernel.org/stable/c/a2b3be930e79cc5d9d829f158e31172b2043f0cd - () https://git.kernel.org/stable/c/a2b3be930e79cc5d9d829f158e31172b2043f0cd - Patch
References () https://git.kernel.org/stable/c/d4c2a041ed3ba114502d5ed6ace5b1a48d637a8e - () https://git.kernel.org/stable/c/d4c2a041ed3ba114502d5ed6ace5b1a48d637a8e - Patch
References () https://git.kernel.org/stable/c/ea759ae0a9ae5acee677d722129710ac89cc59c1 - () https://git.kernel.org/stable/c/ea759ae0a9ae5acee677d722129710ac89cc59c1 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-667
First Time Linux linux Kernel
Linux

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-13 22:01


NVD link : CVE-2022-49316

Mitre link : CVE-2022-49316

CVE.ORG link : CVE-2022-49316


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking