In the Linux kernel, the following vulnerability has been resolved:
devlink: hold region lock when flushing snapshots
Netdevsim triggers a splat on reload, when it destroys regions with snapshots pending:
WARNING: CPU: 1 PID: 787 at net/core/devlink.c:6291 devlinkregionsnapshotdel+0x12e/0x140 CPU: 1 PID: 787 Comm: devlink Not tainted 6.1.0-07460-g7ae9888d6e1c #580 RIP: 0010:devlinkregionsnapshotdel+0x12e/0x140 Call Trace: <TASK> devlregiondestroy+0x70/0x140 nsimdevreloaddown+0x2f/0x60 [netdevsim] devlinkreload+0x1f7/0x360 devlinknlcmdreload+0x6ce/0x860 genlfamilyrcvmsg_doit.isra.0+0x145/0x1c0
This is the locking assert in devlinkregionsnapshotdel(), we're supposed to be holding the region->snapshotlock here.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50712.json",
"cna_assigner": "Linux"
}