CVE-2022-50583

Source
https://cve.org/CVERecord?id=CVE-2022-50583
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50583.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50583
Downstream
Published
2025-12-08T01:12:18.853Z
Modified
2025-12-29T05:12:41.518942Z
Summary
md/raid0, raid10: Don't set discard sectors for request queue
Details

In the Linux kernel, the following vulnerability has been resolved:

md/raid0, raid10: Don't set discard sectors for request queue

It should use diskstacklimits to get a proper maxdiscardsectors rather than setting a value by stack drivers.

And there is a bug. If all member disks are rotational devices, raid0/raid10 set maxdiscardsectors. So the member devices are not ssd/nvme, but raid0/raid10 export the wrong value. It reports warning messages in function _blkdevissue_discard when mkfs.xfs like this:

[ 4616.022599] ------------[ cut here ]------------ [ 4616.027779] WARNING: CPU: 4 PID: 99634 at block/blk-lib.c:50 blkdevissuediscard+0x16a/0x1a0 [ 4616.140663] RIP: 0010:blkdevissuediscard+0x16a/0x1a0 [ 4616.146601] Code: 24 4c 89 20 31 c0 e9 fe fe ff ff c1 e8 09 8d 48 ff 4c 89 f0 4c 09 e8 48 85 c1 0f 84 55 ff ff ff b8 ea ff ff ff e9 df fe ff ff <0f> 0b 48 8d 74 24 08 e8 ea d6 00 00 48 c7 c6 20 1e 89 ab 48 c7 c7 [ 4616.167567] RSP: 0018:ffffaab88cbffca8 EFLAGS: 00010246 [ 4616.173406] RAX: ffff9ba1f9e44678 RBX: 0000000000000000 RCX: ffff9ba1c9792080 [ 4616.181376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff9ba1c9792080 [ 4616.189345] RBP: 0000000000000cc0 R08: ffffaab88cbffd10 R09: 0000000000000000 [ 4616.197317] R10: 0000000000000012 R11: 0000000000000000 R12: 0000000000000000 [ 4616.205288] R13: 0000000000400000 R14: 0000000000000cc0 R15: ffff9ba1c9792080 [ 4616.213259] FS: 00007f9a5534e980(0000) GS:ffff9ba1b7c80000(0000) knlGS:0000000000000000 [ 4616.222298] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 4616.228719] CR2: 000055a390a4c518 CR3: 0000000123e40006 CR4: 00000000001706e0 [ 4616.236689] Call Trace: [ 4616.239428] blkdevissuediscard+0x52/0xb0 [ 4616.244108] blkdevcommonioctl+0x43c/0xa00 [ 4616.248883] blkdevioctl+0x116/0x280 [ 4616.252977] _x64sysioctl+0x8a/0xc0 [ 4616.257163] dosyscall64+0x5c/0x90 [ 4616.261164] ? handlemmfault+0xc5/0x2a0 [ 4616.265652] ? douseraddrfault+0x1d8/0x690 [ 4616.270527] ? dosyscall64+0x69/0x90 [ 4616.274717] ? excpagefault+0x62/0x150 [ 4616.279097] entrySYSCALL64after_hwframe+0x63/0xcd [ 4616.284748] RIP: 0033:0x7f9a55398c6b

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50583.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
70200574cc229f6ba038259e8142af2aa09e6976
Fixed
e80bef070699d2e791badefccb1ddabd6998d468
Fixed
27e5d61a8e6919b5c0c6f473703ffea2acba862a
Fixed
8e1a2279ca2b0485cc379a153d02a9793f74a48f

Affected versions

v5.*
v5.18
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.13
v6.0.14
v6.0.15
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50583.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50583.json"