Логотип exploitDog
bind:CVE-2022-50216
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-50216

Количество 4

Количество 4

ubuntu логотип

CVE-2022-50216

8 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2022-50216

8 месяцев назад

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: md-raid: destroy the bitmap after destroying the thread

EPSS: Низкий
nvd логотип

CVE-2022-50216

8 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-pjqr-wv9q-gvhf

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: md-raid: destroy the bitmap after destroying the thread When we ran the lvm test "shell/integrity-blocksize-3.sh" on a kernel with kasan, we got failure in write_page. The reason for the failure is that md_bitmap_destroy is called before destroying the thread and the thread may be waiting in the function write_page for the bio to complete. When the thread finishes waiting, it executes "if (test_bit(BITMAP_WRITE_ERROR, &bitmap->flags))", which triggers the kasan warning. Note that the commit 48df498daf62 that caused this bug claims that it is neede for md-cluster, you should check md-cluster and possibly find another bugfix for it. BUG: KASAN: use-after-free in write_page+0x18d/0x680 [md_mod] Read of size 8 at addr ffff889162030c78 by task mdX_raid1/5539 CPU: 10 PID: 5539 Comm: mdX_raid1 Not tainted 5.19.0-rc2 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 Call Trace: <TASK>...

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-50216

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

8 месяцев назад
redhat логотип
CVE-2022-50216

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: md-raid: destroy the bitmap after destroying the thread

8 месяцев назад
nvd логотип
CVE-2022-50216

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

8 месяцев назад
github логотип
GHSA-pjqr-wv9q-gvhf

In the Linux kernel, the following vulnerability has been resolved: md-raid: destroy the bitmap after destroying the thread When we ran the lvm test "shell/integrity-blocksize-3.sh" on a kernel with kasan, we got failure in write_page. The reason for the failure is that md_bitmap_destroy is called before destroying the thread and the thread may be waiting in the function write_page for the bio to complete. When the thread finishes waiting, it executes "if (test_bit(BITMAP_WRITE_ERROR, &bitmap->flags))", which triggers the kasan warning. Note that the commit 48df498daf62 that caused this bug claims that it is neede for md-cluster, you should check md-cluster and possibly find another bugfix for it. BUG: KASAN: use-after-free in write_page+0x18d/0x680 [md_mod] Read of size 8 at addr ffff889162030c78 by task mdX_raid1/5539 CPU: 10 PID: 5539 Comm: mdX_raid1 Not tainted 5.19.0-rc2 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 Call Trace: <TASK>...

8 месяцев назад

Уязвимостей на страницу