Home

Description

In the Linux kernel, the following vulnerability has been resolved: dm: verity-loadpin: Only trust verity targets with enforcement Verity targets can be configured to ignore corrupted data blocks. LoadPin must only trust verity targets that are configured to perform some kind of enforcement when data corruption is detected, like returning an error, restarting the system or triggering a panic.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-08 | Updated 2025-12-08 | Assigner Linux

Product status

Default status
unaffected

b6c1c5745ccc68ac5d57c7ffb51ea25a86d0e97b (git) before cb1f5b76e39d86c98722696bdf632987aa777b83
affected

b6c1c5745ccc68ac5d57c7ffb51ea25a86d0e97b (git) before 916ef6232cc4b84db7082b4c3d3cf1753d9462ba
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.0.3 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/cb1f5b76e39d86c98722696bdf632987aa777b83

git.kernel.org/...c/916ef6232cc4b84db7082b4c3d3cf1753d9462ba

cve.org (CVE-2022-50621)

nvd.nist.gov (CVE-2022-50621)

Download JSON