cve-2022-48628
Vulnerability from cvelistv5
Published
2024-03-02 21:52
Modified
2024-11-04 12:13
Severity ?
Summary
ceph: drop messages from MDS when unmounting
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-48628",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-21T16:14:21.087994Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-21T16:14:33.364Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:17:55.568Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/89744b64914426cbabceb3d8a149176b5dafdfb5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/47f82395f04a976d4fa97de7f2acffa1c1096571"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/ceph/caps.c",
            "fs/ceph/mds_client.c",
            "fs/ceph/mds_client.h",
            "fs/ceph/quota.c",
            "fs/ceph/snap.c",
            "fs/ceph/super.c",
            "fs/ceph/super.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "89744b649144",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            },
            {
              "lessThan": "47f82395f04a",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            },
            {
              "lessThan": "e3dfcab2080d",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/ceph/caps.c",
            "fs/ceph/mds_client.c",
            "fs/ceph/mds_client.h",
            "fs/ceph/quota.c",
            "fs/ceph/snap.c",
            "fs/ceph/super.c",
            "fs/ceph/super.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.56",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: drop messages from MDS when unmounting\n\nWhen unmounting all the dirty buffers will be flushed and after\nthe last osd request is finished the last reference of the i_count\nwill be released. Then it will flush the dirty cap/snap to MDSs,\nand the unmounting won\u0027t wait the possible acks, which will ihold\nthe inodes when updating the metadata locally but makes no sense\nany more, of this. This will make the evict_inodes() to skip these\ninodes.\n\nIf encrypt is enabled the kernel generate a warning when removing\nthe encrypt keys when the skipped inodes still hold the keyring:\n\nWARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0\nCPU: 4 PID: 168846 Comm: umount Tainted: G S  6.1.0-rc5-ceph-g72ead199864c #1\nHardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015\nRIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0\nRSP: 0018:ffffc9000b277e28 EFLAGS: 00010202\nRAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00\nRDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000\nRBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000\nR10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40\nR13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000\nFS:  00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cTASK\u003e\ngeneric_shutdown_super+0x47/0x120\nkill_anon_super+0x14/0x30\nceph_kill_sb+0x36/0x90 [ceph]\ndeactivate_locked_super+0x29/0x60\ncleanup_mnt+0xb8/0x140\ntask_work_run+0x67/0xb0\nexit_to_user_mode_prepare+0x23d/0x240\nsyscall_exit_to_user_mode+0x25/0x60\ndo_syscall_64+0x40/0x80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7fd83dc39e9b\n\nLater the kernel will crash when iput() the inodes and dereferencing\nthe \"sb-\u003es_master_keys\", which has been released by the\ngeneric_shutdown_super()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T12:13:33.179Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/89744b64914426cbabceb3d8a149176b5dafdfb5"
        },
        {
          "url": "https://git.kernel.org/stable/c/47f82395f04a976d4fa97de7f2acffa1c1096571"
        },
        {
          "url": "https://git.kernel.org/stable/c/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd"
        }
      ],
      "title": "ceph: drop messages from MDS when unmounting",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48628",
    "datePublished": "2024-03-02T21:52:14.626Z",
    "dateReserved": "2024-02-25T13:44:28.314Z",
    "dateUpdated": "2024-11-04T12:13:33.179Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48628\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-02T22:15:47.000\",\"lastModified\":\"2024-03-04T13:58:23.447\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nceph: drop messages from MDS when unmounting\\n\\nWhen unmounting all the dirty buffers will be flushed and after\\nthe last osd request is finished the last reference of the i_count\\nwill be released. Then it will flush the dirty cap/snap to MDSs,\\nand the unmounting won\u0027t wait the possible acks, which will ihold\\nthe inodes when updating the metadata locally but makes no sense\\nany more, of this. This will make the evict_inodes() to skip these\\ninodes.\\n\\nIf encrypt is enabled the kernel generate a warning when removing\\nthe encrypt keys when the skipped inodes still hold the keyring:\\n\\nWARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0\\nCPU: 4 PID: 168846 Comm: umount Tainted: G S  6.1.0-rc5-ceph-g72ead199864c #1\\nHardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015\\nRIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0\\nRSP: 0018:ffffc9000b277e28 EFLAGS: 00010202\\nRAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00\\nRDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000\\nRBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000\\nR10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40\\nR13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000\\nFS:  00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000\\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\nCR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0\\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\\nCall Trace:\\n\u003cTASK\u003e\\ngeneric_shutdown_super+0x47/0x120\\nkill_anon_super+0x14/0x30\\nceph_kill_sb+0x36/0x90 [ceph]\\ndeactivate_locked_super+0x29/0x60\\ncleanup_mnt+0xb8/0x140\\ntask_work_run+0x67/0xb0\\nexit_to_user_mode_prepare+0x23d/0x240\\nsyscall_exit_to_user_mode+0x25/0x60\\ndo_syscall_64+0x40/0x80\\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\\nRIP: 0033:0x7fd83dc39e9b\\n\\nLater the kernel will crash when iput() the inodes and dereferencing\\nthe \\\"sb-\u003es_master_keys\\\", which has been released by the\\ngeneric_shutdown_super().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ceph: elimina mensajes de MDS al desmontar. Al desmontar, todos los buffers sucios se vaciar\u00e1n y, una vez finalizada la \u00faltima solicitud de osd, se liberar\u00e1 la \u00faltima referencia de i_count. Luego, eliminar\u00e1 la tapa sucia/se ajustar\u00e1 a los MDS, y el desmontaje no esperar\u00e1 los posibles ataques, lo que retendr\u00e1 los inodos al actualizar los metadatos localmente, pero esto ya no tiene sentido. Esto har\u00e1 que evict_inodes() omita estos inodos. Si el cifrado est\u00e1 habilitado, el kernel genera una advertencia al eliminar las claves de cifrado cuando los inodos omitidos a\u00fan contienen el llavero: ADVERTENCIA: CPU: 4 PID: 168846 en fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0 CPU: 4 PID : 168846 Comm: desmontaje Contaminado: GS 6.1.0-rc5-ceph-g72ead199864c #1 Nombre del hardware: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 17/12/2015 RIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0 RSP : 0018:ffffc9000b277e28 EFLAGS: 00010202 RAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00 RDX: 0000000080000000 RSI: ffffffff822f 3a09 RDI: ffff888108f59000 RBP: ffff8881d394fb88 R08: 0000000000000028 R09: 00000000000000000 R10: 00000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40 R13: ffff888108f59000 R14: ffff8881d394f800 R15 : 0000000000000000 FS: 00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005 0033 CR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0 DR0: 00000000000000000 DR1: 00000000000000000 DR2: 00000000000000000 DR 3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas:  generic_shutdown_super+0x47/0x120 kill_anon_super+0x14/0x30 ceph_kill_sb+0x36/0x90 [ceph] deactivate_locked_super+0x29/0x60 cleanup_mnt+0 xb8/0x140 task_work_run+0x67/0xb0 exit_to_user_mode_prepare+0x23d/0x240 syscall_exit_to_user_mode+0x25/0x60 do_syscall_64+0x40/0x80 Entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fd83dc39e9b M\u00e1s tarde, el kernel fallar\u00e1 cuando iput() los inodos y desreferencia el \\\"sb-\u0026gt;s_master_keys\\\", que ha sido liberado por generic_shutdown_super() .\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/47f82395f04a976d4fa97de7f2acffa1c1096571\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/89744b64914426cbabceb3d8a149176b5dafdfb5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.