In the Linux kernel, the following vulnerability has been resolved:
md: call __md_stop_writes in md_stop
From the link [1], we can see raid1d was running even after the path
raid_dtr -> md_stop -> __md_stop.
Let's stop write first in destructor to align with normal md-raid to
fix the KASAN issue.
[1]. https://lore.kernel.org/linux-raid/CAPhsuW5gc4AakdGNdF8ubpezAuDLFOYUO_sfMZcec6hQFm8nhg@mail.gmail.com/T/#m7f12bf90481c02c6d2da68c64aeed4779b7df74a
References
Configurations
Configuration 1 (hide)
|
History
14 Nov 2025, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0dd84b319352bb8ba64752d4e45396d8b13e6018 - Patch | |
| References | () https://git.kernel.org/stable/c/1678ca35b80a94d474fdc31e2497ce5d7ed52512 - Patch | |
| References | () https://git.kernel.org/stable/c/661c01b2181d9413c799127f13143583b69f20fd - Patch | |
| References | () https://git.kernel.org/stable/c/690b5c90fd2d81fd1d2b6110fa36783232f6dce2 - Patch | |
| References | () https://git.kernel.org/stable/c/8e7fb19f1a744fd34e982633ced756fee0498ef7 - Patch | |
| References | () https://git.kernel.org/stable/c/a5a58fab556bfe618b4c9719eb85712d78c6cb10 - Patch | |
| References | () https://git.kernel.org/stable/c/f42a9819ba84bed2e609a4dff56af37063dcabdc - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* |
18 Jun 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-14 18:13
NVD link : CVE-2022-49987
Mitre link : CVE-2022-49987
CVE.ORG link : CVE-2022-49987
JSON object : View
Products Affected
linux
- linux_kernel
CWE
