{"id":"CVE-2022-49220","summary":"dax: make sure inodes are flushed before destroy cache","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndax: make sure inodes are flushed before destroy cache\n\nA bug can be triggered by following command\n\n$ modprobe nd_pmem && modprobe -r nd_pmem\n\n[   10.060014] BUG dax_cache (Not tainted): Objects remaining in dax_cache on __kmem_cache_shutdown()\n[   10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node)\n[   10.062433] Call Trace:\n[   10.062673]  dump_stack_lvl+0x34/0x44\n[   10.062865]  slab_err+0x90/0xd0\n[   10.063619]  __kmem_cache_shutdown+0x13b/0x2f0\n[   10.063848]  kmem_cache_destroy+0x4a/0x110\n[   10.064058]  __x64_sys_delete_module+0x265/0x300\n\nThis is caused by dax_fs_exit() not flushing inodes before destroy cache.\nTo fix this issue, call rcu_barrier() before destroy cache.","modified":"2026-03-20T12:22:16.281506Z","published":"2025-02-26T01:55:52.821Z","related":["SUSE-SU-2025:1293-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49220.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/770d42fff12d8595adda9025a0b92091f543e775"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a7e8de822e0b1979f08767c751f6c8a9c1d4ad86"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b786abe7c67c6ef71410c8e23292b3091d616ad1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e2951eaa9398415ac054b7bd80b8163b6838ead4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec376f5c11c88c0215d173599db8449cd4196759"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f2a1e0eb70c2d954176c07d75d28742bde30e9f3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49220.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49220"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7b6be8444e0f0dd675b54d059793423d3c9b4c03"},{"fixed":"770d42fff12d8595adda9025a0b92091f543e775"},{"fixed":"ec376f5c11c88c0215d173599db8449cd4196759"},{"fixed":"e2951eaa9398415ac054b7bd80b8163b6838ead4"},{"fixed":"f2a1e0eb70c2d954176c07d75d28742bde30e9f3"},{"fixed":"b786abe7c67c6ef71410c8e23292b3091d616ad1"},{"fixed":"a7e8de822e0b1979f08767c751f6c8a9c1d4ad86"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49220.json"}}],"schema_version":"1.7.5"}