In the Linux kernel, the following vulnerability has been resolved:
block: null_blk: end timed out poll request
When poll request is timed out, it is removed from the poll list,
but not completed, so the request is leaked, and never get chance
to complete.
Fix the issue by ending it in timeout handler.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
Wed, 26 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: block: null_blk: end timed out poll request When poll request is timed out, it is removed from the poll list, but not completed, so the request is leaked, and never get chance to complete. Fix the issue by ending it in timeout handler. | |
Title | block: null_blk: end timed out poll request | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T08:28:49.558Z
Reserved: 2025-02-26T01:49:39.243Z
Link: CVE-2022-49057

No data.

Status : Received
Published: 2025-02-26T07:00:42.957
Modified: 2025-02-26T07:00:42.957
Link: CVE-2022-49057
