CVE-2022-49220

Source
https://cve.org/CVERecord?id=CVE-2022-49220
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49220.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49220
Downstream
Related
Published
2025-02-26T01:55:52.821Z
Modified
2026-03-20T12:22:16.281506Z
Summary
dax: make sure inodes are flushed before destroy cache
Details

In the Linux kernel, the following vulnerability has been resolved:

dax: make sure inodes are flushed before destroy cache

A bug can be triggered by following command

$ modprobe ndpmem && modprobe -r ndpmem

[ 10.060014] BUG daxcache (Not tainted): Objects remaining in daxcache on __kmemcacheshutdown() [ 10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node) [ 10.062433] Call Trace: [ 10.062673] dump_stacklvl+0x34/0x44 [ 10.062865] slaberr+0x90/0xd0 [ 10.063619] __kmemcacheshutdown+0x13b/0x2f0 [ 10.063848] kmemcachedestroy+0x4a/0x110 [ 10.064058] _x64sysdeletemodule+0x265/0x300

This is caused by daxfsexit() not flushing inodes before destroy cache. To fix this issue, call rcu_barrier() before destroy cache.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49220.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7b6be8444e0f0dd675b54d059793423d3c9b4c03
Fixed
770d42fff12d8595adda9025a0b92091f543e775
Fixed
ec376f5c11c88c0215d173599db8449cd4196759
Fixed
e2951eaa9398415ac054b7bd80b8163b6838ead4
Fixed
f2a1e0eb70c2d954176c07d75d28742bde30e9f3
Fixed
b786abe7c67c6ef71410c8e23292b3091d616ad1
Fixed
a7e8de822e0b1979f08767c751f6c8a9c1d4ad86

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49220.json"