In the Linux kernel, the following vulnerability has been resolved:
NFSv4: Don't hold the layoutget locks across multiple RPC calls
When doing layoutget as part of the open() compound, we have to be careful to release the layout locks before we can call any further RPC calls, such as setattr(). The reason is that those calls could trigger a recall, which could deadlock.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49316.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "fs/nfs/nfs4proc.c"
},
"id": "CVE-2022-49316-3415e223",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2b3be930e79cc5d9d829f158e31172b2043f0cd",
"digest": {
"line_hashes": [
"275189709720893006134314607347579463087",
"53456999633007951065007329561331559814",
"227447661188107141781907022387014723087",
"318804197457310844823829471582269474560"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "fs/nfs/nfs4proc.c"
},
"id": "CVE-2022-49316-3ca12519",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6b3fc1496e7227cd6a39a80bbfb7588ef7c7a010",
"digest": {
"line_hashes": [
"275189709720893006134314607347579463087",
"53456999633007951065007329561331559814",
"227447661188107141781907022387014723087",
"318804197457310844823829471582269474560"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "fs/nfs/nfs4proc.c",
"function": "_nfs4_open_and_get_state"
},
"id": "CVE-2022-49316-44507b28",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2b3be930e79cc5d9d829f158e31172b2043f0cd",
"digest": {
"function_hash": "80412183048550976822584333321863374067",
"length": 1678.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "fs/nfs/nfs4proc.c",
"function": "_nfs4_open_and_get_state"
},
"id": "CVE-2022-49316-527d1e65",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4c2a041ed3ba114502d5ed6ace5b1a48d637a8e",
"digest": {
"function_hash": "80412183048550976822584333321863374067",
"length": 1678.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "fs/nfs/nfs4proc.c"
},
"id": "CVE-2022-49316-96d2995d",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ee5b9644f06b4d3cdcd9544f43f63312e425a4c",
"digest": {
"line_hashes": [
"275189709720893006134314607347579463087",
"53456999633007951065007329561331559814",
"227447661188107141781907022387014723087",
"318804197457310844823829471582269474560"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "fs/nfs/nfs4proc.c",
"function": "_nfs4_open_and_get_state"
},
"id": "CVE-2022-49316-b68b8918",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6b3fc1496e7227cd6a39a80bbfb7588ef7c7a010",
"digest": {
"function_hash": "199746382618693743162561603945347038472",
"length": 1346.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "fs/nfs/nfs4proc.c"
},
"id": "CVE-2022-49316-ca42443d",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4c2a041ed3ba114502d5ed6ace5b1a48d637a8e",
"digest": {
"line_hashes": [
"275189709720893006134314607347579463087",
"53456999633007951065007329561331559814",
"227447661188107141781907022387014723087",
"318804197457310844823829471582269474560"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "fs/nfs/nfs4proc.c",
"function": "_nfs4_open_and_get_state"
},
"id": "CVE-2022-49316-ddfd11e0",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ee5b9644f06b4d3cdcd9544f43f63312e425a4c",
"digest": {
"function_hash": "80412183048550976822584333321863374067",
"length": 1678.0
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49316.json"