CVE-2022-50211

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
18/06/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> md-raid10: fix KASAN warning<br /> <br /> There&amp;#39;s a KASAN warning in raid10_remove_disk when running the lvm<br /> test lvconvert-raid-reshape.sh. We fix this warning by verifying that the<br /> value "number" is valid.<br /> <br /> BUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]<br /> Read of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682<br /> <br /> CPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x34/0x44<br /> print_report.cold+0x45/0x57a<br /> ? __lock_text_start+0x18/0x18<br /> ? raid10_remove_disk+0x61/0x2a0 [raid10]<br /> kasan_report+0xa8/0xe0<br /> ? raid10_remove_disk+0x61/0x2a0 [raid10]<br /> raid10_remove_disk+0x61/0x2a0 [raid10]<br /> Buffer I/O error on dev dm-76, logical block 15344, async page read<br /> ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0<br /> remove_and_add_spares+0x367/0x8a0 [md_mod]<br /> ? super_written+0x1c0/0x1c0 [md_mod]<br /> ? mutex_trylock+0xac/0x120<br /> ? _raw_spin_lock+0x72/0xc0<br /> ? _raw_spin_lock_bh+0xc0/0xc0<br /> md_check_recovery+0x848/0x960 [md_mod]<br /> raid10d+0xcf/0x3360 [raid10]<br /> ? sched_clock_cpu+0x185/0x1a0<br /> ? rb_erase+0x4d4/0x620<br /> ? var_wake_function+0xe0/0xe0<br /> ? psi_group_change+0x411/0x500<br /> ? preempt_count_sub+0xf/0xc0<br /> ? _raw_spin_lock_irqsave+0x78/0xc0<br /> ? __lock_text_start+0x18/0x18<br /> ? raid10_sync_request+0x36c0/0x36c0 [raid10]<br /> ? preempt_count_sub+0xf/0xc0<br /> ? _raw_spin_unlock_irqrestore+0x19/0x40<br /> ? del_timer_sync+0xa9/0x100<br /> ? try_to_del_timer_sync+0xc0/0xc0<br /> ? _raw_spin_lock_irqsave+0x78/0xc0<br /> ? __lock_text_start+0x18/0x18<br /> ? _raw_spin_unlock_irq+0x11/0x24<br /> ? __list_del_entry_valid+0x68/0xa0<br /> ? finish_wait+0xa3/0x100<br /> md_thread+0x161/0x260 [md_mod]<br /> ? unregister_md_personality+0xa0/0xa0 [md_mod]<br /> ? _raw_spin_lock_irqsave+0x78/0xc0<br /> ? prepare_to_wait_event+0x2c0/0x2c0<br /> ? unregister_md_personality+0xa0/0xa0 [md_mod]<br /> kthread+0x148/0x180<br /> ? kthread_complete_and_exit+0x20/0x20<br /> ret_from_fork+0x1f/0x30<br /> <br /> <br /> Allocated by task 124495:<br /> kasan_save_stack+0x1e/0x40<br /> __kasan_kmalloc+0x80/0xa0<br /> setup_conf+0x140/0x5c0 [raid10]<br /> raid10_run+0x4cd/0x740 [raid10]<br /> md_run+0x6f9/0x1300 [md_mod]<br /> raid_ctr+0x2531/0x4ac0 [dm_raid]<br /> dm_table_add_target+0x2b0/0x620 [dm_mod]<br /> table_load+0x1c8/0x400 [dm_mod]<br /> ctl_ioctl+0x29e/0x560 [dm_mod]<br /> dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]<br /> __do_compat_sys_ioctl+0xfa/0x160<br /> do_syscall_64+0x90/0xc0<br /> entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> <br /> Last potentially related work creation:<br /> kasan_save_stack+0x1e/0x40<br /> __kasan_record_aux_stack+0x9e/0xc0<br /> kvfree_call_rcu+0x84/0x480<br /> timerfd_release+0x82/0x140<br /> L __fput+0xfa/0x400<br /> task_work_run+0x80/0xc0<br /> exit_to_user_mode_prepare+0x155/0x160<br /> syscall_exit_to_user_mode+0x12/0x40<br /> do_syscall_64+0x42/0xc0<br /> entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> <br /> Second to last potentially related work creation:<br /> kasan_save_stack+0x1e/0x40<br /> __kasan_record_aux_stack+0x9e/0xc0<br /> kvfree_call_rcu+0x84/0x480<br /> timerfd_release+0x82/0x140<br /> __fput+0xfa/0x400<br /> task_work_run+0x80/0xc0<br /> exit_to_user_mode_prepare+0x155/0x160<br /> syscall_exit_to_user_mode+0x12/0x40<br /> do_syscall_64+0x42/0xc0<br /> entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> <br /> The buggy address belongs to the object at ffff889108f3d200<br /> which belongs to the cache kmalloc-256 of size 256<br /> The buggy address is located 0 bytes to the right of<br /> 256-byte region [ffff889108f3d200, ffff889108f3d300)<br /> <br /> The buggy address belongs to the physical page:<br /> page:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c<br /> head:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0<br /> flags: 0x4000000000010200(slab|head|zone=2)<br /> raw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40<br /> raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000<br /> page dumped because: kasan: bad access detected<br /> <br /> Memory state around the buggy address:<br /> ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br /> ffff889108f3d280: 00 00<br /> ---truncated---

Impact