CVE-2022-48628
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/03/2024
Last modified:
13/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ceph: drop messages from MDS when unmounting<br />
<br />
When unmounting all the dirty buffers will be flushed and after<br />
the last osd request is finished the last reference of the i_count<br />
will be released. Then it will flush the dirty cap/snap to MDSs,<br />
and the unmounting won&#39;t wait the possible acks, which will ihold<br />
the inodes when updating the metadata locally but makes no sense<br />
any more, of this. This will make the evict_inodes() to skip these<br />
inodes.<br />
<br />
If encrypt is enabled the kernel generate a warning when removing<br />
the encrypt keys when the skipped inodes still hold the keyring:<br />
<br />
WARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0<br />
CPU: 4 PID: 168846 Comm: umount Tainted: G S 6.1.0-rc5-ceph-g72ead199864c #1<br />
Hardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015<br />
RIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0<br />
RSP: 0018:ffffc9000b277e28 EFLAGS: 00010202<br />
RAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00<br />
RDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000<br />
RBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000<br />
R10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40<br />
R13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000<br />
FS: 00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0<br />
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br />
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br />
Call Trace:<br />
<br />
generic_shutdown_super+0x47/0x120<br />
kill_anon_super+0x14/0x30<br />
ceph_kill_sb+0x36/0x90 [ceph]<br />
deactivate_locked_super+0x29/0x60<br />
cleanup_mnt+0xb8/0x140<br />
task_work_run+0x67/0xb0<br />
exit_to_user_mode_prepare+0x23d/0x240<br />
syscall_exit_to_user_mode+0x25/0x60<br />
do_syscall_64+0x40/0x80<br />
entry_SYSCALL_64_after_hwframe+0x63/0xcd<br />
RIP: 0033:0x7fd83dc39e9b<br />
<br />
Later the kernel will crash when iput() the inodes and dereferencing<br />
the "sb->s_master_keys", which has been released by the<br />
generic_shutdown_super().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.56 (excluding) | |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/47f82395f04a976d4fa97de7f2acffa1c1096571
- https://git.kernel.org/stable/c/89744b64914426cbabceb3d8a149176b5dafdfb5
- https://git.kernel.org/stable/c/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd
- https://git.kernel.org/stable/c/47f82395f04a976d4fa97de7f2acffa1c1096571
- https://git.kernel.org/stable/c/89744b64914426cbabceb3d8a149176b5dafdfb5
- https://git.kernel.org/stable/c/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd