Bug 2348326 (CVE-2022-49057) - CVE-2022-49057 kernel: block: null_blk: end timed out poll request
Summary: CVE-2022-49057 kernel: block: null_blk: end timed out poll request
Keywords:
Status: NEW
Alias: CVE-2022-49057
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-26 03:25 UTC by OSIDB Bzimport
Modified: 2025-02-26 15:22 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-26 03:25:32 UTC
In the Linux kernel, the following vulnerability has been resolved:

block: null_blk: end timed out poll request

When poll request is timed out, it is removed from the poll list,
but not completed, so the request is leaked, and never get chance
to complete.

Fix the issue by ending it in timeout handler.

Comment 1 Avinash Hanwate 2025-02-26 10:47:55 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49057-94a2@gregkh/T

Comment 4 Avinash Hanwate 2025-02-26 15:21:31 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49057-94a2@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.