CVE-2022-50583Function Call with Incorrectly Specified Arguments in Linux

Severity
2.3LOW
No vector
EPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: md/raid0, raid10: Don't set discard sectors for request queue It should use disk_stack_limits to get a proper max_discard_sectors rather than setting a value by stack drivers. And there is a bug. If all member disks are rotational devices, raid0/raid10 set max_discard_sectors. So the member devices are not ssd/nvme, but raid0/raid10 export the wrong value. It reports warning messages in function __blkdev_issue_discard when mk

Affected Packages4 packages

Linuxlinux/linux_kernel5.19.06.0.16+1
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linux70200574cc229f6ba038259e8142af2aa09e6976e80bef070699d2e791badefccb1ddabd6998d468+3
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-rjwc-3v8m-48m3: In the Linux kernel, the following vulnerability has been resolved: md/raid0, raid10: Don't set discard sectors for request queue It should use disk2025-12-08
OSV
md/raid0, raid10: Don't set discard sectors for request queue2025-12-08
OSV
CVE-2022-50583: In the Linux kernel, the following vulnerability has been resolved: md/raid0, raid10: Don't set discard sectors for request queue It should use disk_s2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: md/raid0, raid10: Don't set discard sectors for request queue2025-12-08
Debian
CVE-2022-50583: linux - In the Linux kernel, the following vulnerability has been resolved: md/raid0, r...2022