Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-49281
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-26 Feb, 2025 | 01:56
Updated At-23 Dec, 2025 | 13:22
Rejected At-
▼CVE Numbering Authority (CNA)
cifs: fix handlecache and multiuser

In the Linux kernel, the following vulnerability has been resolved: cifs: fix handlecache and multiuser In multiuser each individual user has their own tcon structure for the share and thus their own handle for a cached directory. When we umount such a share we much make sure to release the pinned down dentry for each such tcon and not just the master tcon. Otherwise we will get nasty warnings on umount that dentries are still in use: [ 3459.590047] BUG: Dentry 00000000115c6f41{i=12000000019d95,n=/} still in use\ (2) [unmount of cifs cifs] ... [ 3459.590492] Call Trace: [ 3459.590500] d_walk+0x61/0x2a0 [ 3459.590518] ? shrink_lock_dentry.part.0+0xe0/0xe0 [ 3459.590526] shrink_dcache_for_umount+0x49/0x110 [ 3459.590535] generic_shutdown_super+0x1a/0x110 [ 3459.590542] kill_anon_super+0x14/0x30 [ 3459.590549] cifs_kill_sb+0xf5/0x104 [cifs] [ 3459.590773] deactivate_locked_super+0x36/0xa0 [ 3459.590782] cleanup_mnt+0x131/0x190 [ 3459.590789] task_work_run+0x5c/0x90 [ 3459.590798] exit_to_user_mode_loop+0x151/0x160 [ 3459.590809] exit_to_user_mode_prepare+0x83/0xd0 [ 3459.590818] syscall_exit_to_user_mode+0x12/0x30 [ 3459.590828] do_syscall_64+0x48/0x90 [ 3459.590833] entry_SYSCALL_64_after_hwframe+0x44/0xae

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/cifs/cifsfs.c
Default Status
unaffected
Versions
Affected
  • From 5e9c89d43fa6f5d458d4d0f9e22a67cc001c8da9 before 2fafbc198613823943c106d1ec9b516da692059f (git)
  • From 5e9c89d43fa6f5d458d4d0f9e22a67cc001c8da9 before ffa631c4bff59dde59b598011f570e27dfba3515 (git)
  • From 5e9c89d43fa6f5d458d4d0f9e22a67cc001c8da9 before e71f6a3a1d5c826a30384fec587ca7503ef6bde5 (git)
  • From 5e9c89d43fa6f5d458d4d0f9e22a67cc001c8da9 before 47178c7722ac528ea08aa82c3ef9ffa178962d7a (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/cifs/cifsfs.c
Default Status
affected
Versions
Affected
  • 5.13
Unaffected
  • From 0 before 5.13 (semver)
  • From 5.15.33 through 5.15.* (semver)
  • From 5.16.19 through 5.16.* (semver)
  • From 5.17.2 through 5.17.* (semver)
  • From 5.18 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2fafbc198613823943c106d1ec9b516da692059f
N/A
https://git.kernel.org/stable/c/ffa631c4bff59dde59b598011f570e27dfba3515
N/A
https://git.kernel.org/stable/c/e71f6a3a1d5c826a30384fec587ca7503ef6bde5
N/A
https://git.kernel.org/stable/c/47178c7722ac528ea08aa82c3ef9ffa178962d7a
N/A
Hyperlink: https://git.kernel.org/stable/c/2fafbc198613823943c106d1ec9b516da692059f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ffa631c4bff59dde59b598011f570e27dfba3515
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e71f6a3a1d5c826a30384fec587ca7503ef6bde5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/47178c7722ac528ea08aa82c3ef9ffa178962d7a
Resource: N/A
Details not found