CVE-2022-49281
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
21/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cifs: fix handlecache and multiuser<br />
<br />
In multiuser each individual user has their own tcon structure for the<br />
share and thus their own handle for a cached directory.<br />
When we umount such a share we much make sure to release the pinned down dentry<br />
for each such tcon and not just the master tcon.<br />
<br />
Otherwise we will get nasty warnings on umount that dentries are still in use:<br />
[ 3459.590047] BUG: Dentry 00000000115c6f41{i=12000000019d95,n=/} still in use\<br />
(2) [unmount of cifs cifs]<br />
...<br />
[ 3459.590492] Call Trace:<br />
[ 3459.590500] d_walk+0x61/0x2a0<br />
[ 3459.590518] ? shrink_lock_dentry.part.0+0xe0/0xe0<br />
[ 3459.590526] shrink_dcache_for_umount+0x49/0x110<br />
[ 3459.590535] generic_shutdown_super+0x1a/0x110<br />
[ 3459.590542] kill_anon_super+0x14/0x30<br />
[ 3459.590549] cifs_kill_sb+0xf5/0x104 [cifs]<br />
[ 3459.590773] deactivate_locked_super+0x36/0xa0<br />
[ 3459.590782] cleanup_mnt+0x131/0x190<br />
[ 3459.590789] task_work_run+0x5c/0x90<br />
[ 3459.590798] exit_to_user_mode_loop+0x151/0x160<br />
[ 3459.590809] exit_to_user_mode_prepare+0x83/0xd0<br />
[ 3459.590818] syscall_exit_to_user_mode+0x12/0x30<br />
[ 3459.590828] do_syscall_64+0x48/0x90<br />
[ 3459.590833] entry_SYSCALL_64_after_hwframe+0x44/0xae
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.33 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



