Bug 2347914 (CVE-2022-49171)
Summary: | CVE-2022-49171 kernel: ext4: don't BUG if someone dirty pages without asking ext4 first | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | dfreiber, drow, jburrell, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw in the Linux kernel’s ext4 filesystem allows memory pages to be modified without properly notifying the filesystem. This lack of synchronization can lead to inconsistent file states or system crashes, particularly in high-concurrency scenarios. The vulnerability is caused by a race condition where memory marked as "dirty" isn't communicated correctly to ext4, making it unaware of pending changes. As an interim mitigation, newer kernels issue warnings and mark affected memory pages as clean to prevent exploitation, especially by unprivileged users attempting denial-of-service attacks. Updating to a patched kernel version is recommended to ensure system reliability and data integrity.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
OSIDB Bzimport
2025-02-26 03:11:12 UTC
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49171-83e6@gregkh/T |