Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2022-50705

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> io_uring/rw: defer fsnotify calls to task context<br /> <br /> We can&amp;#39;t call these off the kiocb completion as that might be off<br /> soft/hard irq context. Defer the calls to when we process the<br /> task_work for this request. That avoids valid complaints like:<br /> <br /> stack backtrace:<br /> CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.0.0-rc6-syzkaller-00321-g105a36f3694e #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022<br /> Call Trace:<br /> <br /> __dump_stack lib/dump_stack.c:88 [inline]<br /> dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106<br /> print_usage_bug kernel/locking/lockdep.c:3961 [inline]<br /> valid_state kernel/locking/lockdep.c:3973 [inline]<br /> mark_lock_irq kernel/locking/lockdep.c:4176 [inline]<br /> mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632<br /> mark_lock kernel/locking/lockdep.c:4596 [inline]<br /> mark_usage kernel/locking/lockdep.c:4527 [inline]<br /> __lock_acquire+0x11d9/0x56d0 kernel/locking/lockdep.c:5007<br /> lock_acquire kernel/locking/lockdep.c:5666 [inline]<br /> lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5631<br /> __fs_reclaim_acquire mm/page_alloc.c:4674 [inline]<br /> fs_reclaim_acquire+0x115/0x160 mm/page_alloc.c:4688<br /> might_alloc include/linux/sched/mm.h:271 [inline]<br /> slab_pre_alloc_hook mm/slab.h:700 [inline]<br /> slab_alloc mm/slab.c:3278 [inline]<br /> __kmem_cache_alloc_lru mm/slab.c:3471 [inline]<br /> kmem_cache_alloc+0x39/0x520 mm/slab.c:3491<br /> fanotify_alloc_fid_event fs/notify/fanotify/fanotify.c:580 [inline]<br /> fanotify_alloc_event fs/notify/fanotify/fanotify.c:813 [inline]<br /> fanotify_handle_event+0x1130/0x3f40 fs/notify/fanotify/fanotify.c:948<br /> send_to_group fs/notify/fsnotify.c:360 [inline]<br /> fsnotify+0xafb/0x1680 fs/notify/fsnotify.c:570<br /> __fsnotify_parent+0x62f/0xa60 fs/notify/fsnotify.c:230<br /> fsnotify_parent include/linux/fsnotify.h:77 [inline]<br /> fsnotify_file include/linux/fsnotify.h:99 [inline]<br /> fsnotify_access include/linux/fsnotify.h:309 [inline]<br /> __io_complete_rw_common+0x485/0x720 io_uring/rw.c:195<br /> io_complete_rw+0x1a/0x1f0 io_uring/rw.c:228<br /> iomap_dio_complete_work fs/iomap/direct-io.c:144 [inline]<br /> iomap_dio_bio_end_io+0x438/0x5e0 fs/iomap/direct-io.c:178<br /> bio_endio+0x5f9/0x780 block/bio.c:1564<br /> req_bio_endio block/blk-mq.c:695 [inline]<br /> blk_update_request+0x3fc/0x1300 block/blk-mq.c:825<br /> scsi_end_request+0x7a/0x9a0 drivers/scsi/scsi_lib.c:541<br /> scsi_io_completion+0x173/0x1f70 drivers/scsi/scsi_lib.c:971<br /> scsi_complete+0x122/0x3b0 drivers/scsi/scsi_lib.c:1438<br /> blk_complete_reqs+0xad/0xe0 block/blk-mq.c:1022<br /> __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571<br /> invoke_softirq kernel/softirq.c:445 [inline]<br /> __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650<br /> irq_exit_rcu+0x5/0x20 kernel/softirq.c:662<br /> common_interrupt+0xa9/0xc0 arch/x86/kernel/irq.c:240

Impacto