CVE-2022-49281

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49281
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49281.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49281
Downstream
Related
Published
2025-02-26T07:01:04Z
Modified
2025-08-09T20:01:28Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

cifs: fix handlecache and multiuser

In multiuser each individual user has their own tcon structure for the share and thus their own handle for a cached directory. When we umount such a share we much make sure to release the pinned down dentry for each such tcon and not just the master tcon.

Otherwise we will get nasty warnings on umount that dentries are still in use: [ 3459.590047] BUG: Dentry 00000000115c6f41{i=12000000019d95,n=/} still in use\ (2) [unmount of cifs cifs] ... [ 3459.590492] Call Trace: [ 3459.590500] dwalk+0x61/0x2a0 [ 3459.590518] ? shrinklockdentry.part.0+0xe0/0xe0 [ 3459.590526] shrinkdcacheforumount+0x49/0x110 [ 3459.590535] genericshutdownsuper+0x1a/0x110 [ 3459.590542] killanonsuper+0x14/0x30 [ 3459.590549] cifskillsb+0xf5/0x104 [cifs] [ 3459.590773] deactivatelockedsuper+0x36/0xa0 [ 3459.590782] cleanupmnt+0x131/0x190 [ 3459.590789] taskworkrun+0x5c/0x90 [ 3459.590798] exittousermodeloop+0x151/0x160 [ 3459.590809] exittousermodeprepare+0x83/0xd0 [ 3459.590818] syscallexittousermode+0x12/0x30 [ 3459.590828] dosyscall64+0x48/0x90 [ 3459.590833] entrySYSCALL64after_hwframe+0x44/0xae

References

Affected packages