Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-48628— ceph: drop messages from MDS when unmounting

EPSS 0.01% · P1
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-48628

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ceph: drop messages from MDS when unmounting
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ceph: drop messages from MDS when unmounting When unmounting all the dirty buffers will be flushed and after the last osd request is finished the last reference of the i_count will be released. Then it will flush the dirty cap/snap to MDSs, and the unmounting won't wait the possible acks, which will ihold the inodes when updating the metadata locally but makes no sense any more, of this. This will make the evict_inodes() to skip these inodes. If encrypt is enabled the kernel generate a warning when removing the encrypt keys when the skipped inodes still hold the keyring: WARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0 CPU: 4 PID: 168846 Comm: umount Tainted: G S 6.1.0-rc5-ceph-g72ead199864c #1 Hardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015 RIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0 RSP: 0018:ffffc9000b277e28 EFLAGS: 00010202 RAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00 RDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000 RBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000 R10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40 R13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000 FS: 00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> generic_shutdown_super+0x47/0x120 kill_anon_super+0x14/0x30 ceph_kill_sb+0x36/0x90 [ceph] deactivate_locked_super+0x29/0x60 cleanup_mnt+0xb8/0x140 task_work_run+0x67/0xb0 exit_to_user_mode_prepare+0x23d/0x240 syscall_exit_to_user_mode+0x25/0x60 do_syscall_64+0x40/0x80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fd83dc39e9b Later the kernel will crash when iput() the inodes and dereferencing the "sb->s_master_keys", which has been released by the generic_shutdown_super().
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于当 iput() 索引节点并取消引用 sb->s_master_keys 时,内核将崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 9030aaf9bf0a1eee47a154c316c789e959638b0f ~ 89744b64914426cbabceb3d8a149176b5dafdfb5 -
LinuxLinux 2.6.34 -

II. Public POCs for CVE-2022-48628

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-48628

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-03-02 · 57 CVEs total

CVE-2023-52563drm/meson: fix memory leak on ->hpd_notify callback
CVE-2023-52581netfilter: nf_tables: fix memleak when more than 255 elements expired
CVE-2023-52574team: fix null-ptr-deref when team device type is changed
CVE-2023-52578net: bridge: use DEV_STATS_INC()
CVE-2023-52577dccp: fix dccp_v4_err()/dccp_v6_err() again
CVE-2023-52576x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()
CVE-2023-52580net/core: Fix ETH_P_1588 flow dissector
CVE-2023-52566nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()
CVE-2023-52565media: uvcvideo: Fix OOB read
CVE-2023-52564Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux"
CVE-2023-52567serial: 8250_port: Check IRQ data before use
CVE-2023-52562mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()
CVE-2023-52561arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved
CVE-2023-52560mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()
CVE-2023-52559iommu/vt-d: Avoid memory allocation in iommu_suspend()
CVE-2023-52518Bluetooth: hci_codec: Fix leaking content of local_codecs
CVE-2023-52532net: mana: Fix TX CQE error handling
CVE-2023-52531wifi: iwlwifi: mvm: Fix a memory corruption issue
CVE-2023-52530wifi: mac80211: fix potential key use-after-free
CVE-2023-52529HID: sony: Fix a potential memory leak in sony_probe()

Showing top 20 of 57 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-48628

No comments yet


Leave a comment