-

CVE-2022-50519

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure

If creation or finalization of a checkpoint fails due to anomalies in the
checkpoint metadata on disk, a kernel warning is generated.

This patch replaces the WARN_ONs by nilfs_error, so that a kernel, booted
with panic_on_warn, does not panic.  A nilfs_error is appropriate here to
handle the abnormal filesystem condition.

This also replaces the detected error codes with an I/O error so that
neither of the internal error codes is returned to callers.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < b63026b5e13040cd5afa11769dd0d9e1504b031a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ae16440c44ae2acda6d72aff9d74eccf8967dae5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < bf98be80cbe3b4e6c86c36ed00457389aca3eb15
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 259c0f68168ac6a598db3486597b10e74d625db0
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8a18fdc5ae8e6d7ac33c6ee0a2e5f9f1414ef412
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c0c3d3d3ea41cb5228ee90568bb953f9a56c3227
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 090fcfb6edeb9367a915b2749e2bd1f8b48d8898
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 5c0776b5bc31de7cd28afb558fae37a20f33602e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 723ac751208f6d6540191689cfbf6c77135a7a1b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.218
Status unaffected
Version <= 5.10.*
Version 5.10.148
Status unaffected
Version <= 5.15.*
Version 5.15.74
Status unaffected
Version <= 5.19.*
Version 5.19.16
Status unaffected
Version <= 6.0.*
Version 6.0.2
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String