-

CVE-2022-50519

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure

If creation or finalization of a checkpoint fails due to anomalies in the
checkpoint metadata on disk, a kernel warning is generated.

This patch replaces the WARN_ONs by nilfs_error, so that a kernel, booted
with panic_on_warn, does not panic.  A nilfs_error is appropriate here to
handle the abnormal filesystem condition.

This also replaces the detected error codes with an I/O error so that
neither of the internal error codes is returned to callers.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < b63026b5e13040cd5afa11769dd0d9e1504b031a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ae16440c44ae2acda6d72aff9d74eccf8967dae5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < bf98be80cbe3b4e6c86c36ed00457389aca3eb15
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 259c0f68168ac6a598db3486597b10e74d625db0
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8a18fdc5ae8e6d7ac33c6ee0a2e5f9f1414ef412
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c0c3d3d3ea41cb5228ee90568bb953f9a56c3227
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 090fcfb6edeb9367a915b2749e2bd1f8b48d8898
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 5c0776b5bc31de7cd28afb558fae37a20f33602e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 723ac751208f6d6540191689cfbf6c77135a7a1b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.218
Status unaffected
Version <= 5.10.*
Version 5.10.148
Status unaffected
Version <= 5.15.*
Version 5.15.74
Status unaffected
Version <= 5.19.*
Version 5.19.16
Status unaffected
Version <= 6.0.*
Version 6.0.2
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string