目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2022-48797— Linux kernel 安全漏洞

EPSS 0.02% · P5
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2022-48797 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
mm: don't try to NUMA-migrate COW pages that have other uses
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: mm: don't try to NUMA-migrate COW pages that have other uses Oded Gabbay reports that enabling NUMA balancing causes corruption with his Gaudi accelerator test load: "All the details are in the bug, but the bottom line is that somehow, this patch causes corruption when the numa balancing feature is enabled AND we don't use process affinity AND we use GUP to pin pages so our accelerator can DMA to/from system memory. Either disabling numa balancing, using process affinity to bind to specific numa-node or reverting this patch causes the bug to disappear" and Oded bisected the issue to commit 09854ba94c6a ("mm: do_wp_page() simplification"). Now, the NUMA balancing shouldn't actually be changing the writability of a page, and as such shouldn't matter for COW. But it appears it does. Suspicious. However, regardless of that, the condition for enabling NUMA faults in change_pte_range() is nonsensical. It uses "page_mapcount(page)" to decide if a COW page should be NUMA-protected or not, and that makes absolutely no sense. The number of mappings a page has is irrelevant: not only does GUP get a reference to a page as in Oded's case, but the other mappings migth be paged out and the only reference to them would be in the page count. Since we should never try to NUMA-balance a page that we can't move anyway due to other references, just fix the code to use 'page_count()'. Oded confirms that that fixes his issue. Now, this does imply that something in NUMA balancing ends up changing page protections (other than the obvious one of making the page inaccessible to get the NUMA faulting information). Otherwise the COW simplification wouldn't matter - since doing the GUP on the page would make sure it's writable. The cause of that permission change would be good to figure out too, since it clearly results in spurious COW events - but fixing the nonsensical test that just happened to work before is obviously the CorrectThing(tm) to do regardless.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于mm模块中发现NUMA迁移问题。在启用NUMA平衡时,可能会导致数据损坏。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 09854ba94c6aad7886996bfbee2530b3d8a7f4f4 ~ 254090925e16abd914c87b4ad1b489440d89c4c3 -
LinuxLinux 5.9 -

二、漏洞 CVE-2022-48797 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2022-48797 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2024-07-16 · 共 98 条

CVE-2022-48832Linux kernel 安全漏洞
CVE-2022-48826Linux kernel 安全漏洞
CVE-2022-48822Linux kernel 安全漏洞
CVE-2022-48821Linux kernel 安全漏洞
CVE-2022-48819Linux kernel 安全漏洞
CVE-2022-48820Linux kernel 安全漏洞
CVE-2022-48818Linux kernel 安全漏洞
CVE-2022-48823Linux kernel 安全漏洞
CVE-2022-48830Linux kernel 安全漏洞
CVE-2022-48831Linux kernel 安全漏洞
CVE-2022-48828Linux kernel 安全漏洞
CVE-2022-48834Linux kernel 安全漏洞
CVE-2022-48833Linux kernel 安全漏洞
CVE-2022-48835Linux kernel 安全漏洞
CVE-2022-48837Linux kernel 安全漏洞
CVE-2022-48836Linux kernel 安全漏洞
CVE-2022-48838Linux kernel 安全漏洞
CVE-2022-48839Linux kernel 安全漏洞
CVE-2022-48840Linux kernel 安全漏洞
CVE-2022-48842Linux kernel 安全漏洞

显示前 20 条,共 98 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-48797

暂无评论


发表评论