目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2022-48818— Linux kernel 安全漏洞

EPSS 0.03% · P10
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2022-48818の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
net: dsa: mv88e6xxx: don't use devres for mdiobus
ソース: NVD (National Vulnerability Database)
脆弱性説明
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: don't use devres for mdiobus As explained in commits: 74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres") 5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres") mdiobus_free() will panic when called from devm_mdiobus_free() <- devres_release_all() <- __device_release_driver(), and that mdiobus was not previously unregistered. The mv88e6xxx is an MDIO device, so the initial set of constraints that I thought would cause this (I2C or SPI buses which call ->remove on ->shutdown) do not apply. But there is one more which applies here. If the DSA master itself is on a bus that calls ->remove from ->shutdown (like dpaa2-eth, which is on the fsl-mc bus), there is a device link between the switch and the DSA master, and device_links_unbind_consumers() will unbind the Marvell switch driver on shutdown. systemd-shutdown[1]: Powering off. mv88e6085 0x0000000008b96000:00 sw_gl0: Link is Down fsl-mc dpbp.9: Removing from iommu group 7 fsl-mc dpbp.8: Removing from iommu group 7 ------------[ cut here ]------------ kernel BUG at drivers/net/phy/mdio_bus.c:677! Internal error: Oops - BUG: 0 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 1 Comm: systemd-shutdow Not tainted 5.16.5-00040-gdc05f73788e5 #15 pc : mdiobus_free+0x44/0x50 lr : devm_mdiobus_free+0x10/0x20 Call trace: mdiobus_free+0x44/0x50 devm_mdiobus_free+0x10/0x20 devres_release_all+0xa0/0x100 __device_release_driver+0x190/0x220 device_release_driver_internal+0xac/0xb0 device_links_unbind_consumers+0xd4/0x100 __device_release_driver+0x4c/0x220 device_release_driver_internal+0xac/0xb0 device_links_unbind_consumers+0xd4/0x100 __device_release_driver+0x94/0x220 device_release_driver+0x28/0x40 bus_remove_device+0x118/0x124 device_del+0x174/0x420 fsl_mc_device_remove+0x24/0x40 __fsl_mc_device_remove+0xc/0x20 device_for_each_child+0x58/0xa0 dprc_remove+0x90/0xb0 fsl_mc_driver_remove+0x20/0x5c __device_release_driver+0x21c/0x220 device_release_driver+0x28/0x40 bus_remove_device+0x118/0x124 device_del+0x174/0x420 fsl_mc_bus_remove+0x80/0x100 fsl_mc_bus_shutdown+0xc/0x1c platform_shutdown+0x20/0x30 device_shutdown+0x154/0x330 kernel_power_off+0x34/0x6c __do_sys_reboot+0x15c/0x250 __arm64_sys_reboot+0x20/0x30 invoke_syscall.constprop.0+0x4c/0xe0 do_el0_svc+0x4c/0x150 el0_svc+0x24/0xb0 el0t_64_sync_handler+0xa8/0xb0 el0t_64_sync+0x178/0x17c So the same treatment must be applied to all DSA switch drivers, which is: either use devres for both the mdiobus allocation and registration, or don't use devres at all. The Marvell driver already has a good structure for mdiobus removal, so just plug in mdiobus_free and get rid of devres.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Linux kernel 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于net:dsa:mv88e6xxx模块中发现使用devres问题。mdiobus_free函数在devm_mdiobus_free函数调用时可能会导致系统崩溃。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
LinuxLinux ac3a68d56651c3dad2c12c7afce065fe15267f44 ~ 8ccebe77df6e0d88c72ba5e69cf1835927e53b6c -
LinuxLinux 5.9 -

II. CVE-2022-48818の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2022-48818のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-07-16 · 98 CVEs total

CVE-2022-48832audit: don't deref the syscall args when checking the openat2 open_how::flags
CVE-2022-48826drm/vc4: Fix deadlock on DSI device attach error
CVE-2022-48822usb: f_fs: Fix use-after-free for epfile
CVE-2022-48821misc: fastrpc: avoid double fput() on failed usercopy
CVE-2022-48819tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case
CVE-2022-48820phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
CVE-2022-48817net: dsa: ar9331: register the mdiobus under devres
CVE-2022-48823scsi: qedf: Fix refcount issue when LOGO is received during TMF
CVE-2022-48830can: isotp: fix potential CAN frame reception race in isotp_rcv()
CVE-2022-48831ima: fix reference leak in asymmetric_verify()
CVE-2022-48828NFSD: Fix ia_size underflow
CVE-2022-48834usb: usbtmc: Fix bug in pipe direction for control transfers
CVE-2022-48833btrfs: skip reserved bytes warning on unmount after log cleanup failure
CVE-2022-48835scsi: mpt3sas: Page fault in reply q processing
CVE-2022-48837usb: gadget: rndis: prevent integer overflow in rndis_set_response()
CVE-2022-48836Input: aiptek - properly check endpoint type
CVE-2022-48838usb: gadget: Fix use-after-free bug by not setting udc->dev.driver
CVE-2022-48839net/packet: fix slab-out-of-bounds access in packet_recvmsg()
CVE-2022-48840iavf: Fix hang during reboot/shutdown
CVE-2022-48842ice: Fix race condition during interface enslave

Showing 20 of 98 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2022-48818へのコメント

まだコメントはありません


コメントを残す