CVE-2022-49057

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49057
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49057.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49057
Downstream
Related
Published
2025-02-26T01:54:28Z
Modified
2025-10-15T17:56:43.883912Z
Summary
block: null_blk: end timed out poll request
Details

In the Linux kernel, the following vulnerability has been resolved:

block: null_blk: end timed out poll request

When poll request is timed out, it is removed from the poll list, but not completed, so the request is leaked, and never get chance to complete.

Fix the issue by ending it in timeout handler.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0a593fbbc245a85940ed34caa3aa1e4cb060c54b
Fixed
407d09a22f3f685fd634aa5d05840c64b23bfebc
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0a593fbbc245a85940ed34caa3aa1e4cb060c54b
Fixed
3e3876d322aef82416ecc496a4d4a587e0fdf7a3

Affected versions

v5.*

v5.15
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.17.1
v5.17.2
v5.17.3
v5.18-rc1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.4