CVE-2022-48919
22.08.2024, 02:15
In the Linux kernel, the following vulnerability has been resolved: cifs: fix double free race when mount fails in cifs_get_root() When cifs_get_root() fails during cifs_smb3_do_mount() we call deactivate_locked_super() which eventually will call delayed_free() which will free the context. In this situation we should not proceed to enter the out: section in cifs_smb3_do_mount() and free the same resources a second time. [Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0 [Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G OE 5.17.0-rc3+ #4 [Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019 [Thu Feb 10 12:59:06 2022] Call Trace: [Thu Feb 10 12:59:06 2022] <IRQ> [Thu Feb 10 12:59:06 2022] dump_stack_lvl+0x5d/0x78 [Thu Feb 10 12:59:06 2022] print_address_description.constprop.0+0x24/0x150 [Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] kasan_report.cold+0x7d/0x117 [Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] __asan_load8+0x86/0xa0 [Thu Feb 10 12:59:06 2022] rcu_cblist_dequeue+0x32/0x60 [Thu Feb 10 12:59:06 2022] rcu_core+0x547/0xca0 [Thu Feb 10 12:59:06 2022] ? call_rcu+0x3c0/0x3c0 [Thu Feb 10 12:59:06 2022] ? __this_cpu_preempt_check+0x13/0x20 [Thu Feb 10 12:59:06 2022] ? lock_is_held_type+0xea/0x140 [Thu Feb 10 12:59:06 2022] rcu_core_si+0xe/0x10 [Thu Feb 10 12:59:06 2022] __do_softirq+0x1d4/0x67b [Thu Feb 10 12:59:06 2022] __irq_exit_rcu+0x100/0x150 [Thu Feb 10 12:59:06 2022] irq_exit_rcu+0xe/0x30 [Thu Feb 10 12:59:06 2022] sysvec_hyperv_stimer0+0x9d/0xc0 ... [Thu Feb 10 12:59:07 2022] Freed by task 58179: [Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50 [Thu Feb 10 12:59:07 2022] kasan_set_track+0x25/0x30 [Thu Feb 10 12:59:07 2022] kasan_set_free_info+0x24/0x40 [Thu Feb 10 12:59:07 2022] ____kasan_slab_free+0x137/0x170 [Thu Feb 10 12:59:07 2022] __kasan_slab_free+0x12/0x20 [Thu Feb 10 12:59:07 2022] slab_free_freelist_hook+0xb3/0x1d0 [Thu Feb 10 12:59:07 2022] kfree+0xcd/0x520 [Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0x149/0xbe0 [cifs] [Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs] [Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140 [Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0 [Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210 [Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0 [Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae [Thu Feb 10 12:59:07 2022] Last potentially related work creation: [Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50 [Thu Feb 10 12:59:07 2022] __kasan_record_aux_stack+0xb6/0xc0 [Thu Feb 10 12:59:07 2022] kasan_record_aux_stack_noalloc+0xb/0x10 [Thu Feb 10 12:59:07 2022] call_rcu+0x76/0x3c0 [Thu Feb 10 12:59:07 2022] cifs_umount+0xce/0xe0 [cifs] [Thu Feb 10 12:59:07 2022] cifs_kill_sb+0xc8/0xe0 [cifs] [Thu Feb 10 12:59:07 2022] deactivate_locked_super+0x5d/0xd0 [Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0xab9/0xbe0 [cifs] [Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs] [Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140 [Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0 [Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210 [Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0 [Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xaeEnginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 4.9.305 |
linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.270 |
linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.233 |
linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.183 |
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.104 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.27 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.16.13 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
linux |
| ||||||||||||
linux-allwinner-5.19 |
| ||||||||||||
linux-aws |
| ||||||||||||
linux-aws-5.0 |
| ||||||||||||
linux-aws-5.11 |
| ||||||||||||
linux-aws-5.13 |
| ||||||||||||
linux-aws-5.15 |
| ||||||||||||
linux-aws-5.19 |
| ||||||||||||
linux-aws-5.3 |
| ||||||||||||
linux-aws-5.4 |
| ||||||||||||
linux-aws-5.8 |
| ||||||||||||
linux-aws-6.2 |
| ||||||||||||
linux-aws-6.5 |
| ||||||||||||
linux-aws-fips |
| ||||||||||||
linux-aws-hwe |
| ||||||||||||
linux-azure |
| ||||||||||||
linux-azure-4.15 |
| ||||||||||||
linux-azure-5.11 |
| ||||||||||||
linux-azure-5.13 |
| ||||||||||||
linux-azure-5.15 |
| ||||||||||||
linux-azure-5.19 |
| ||||||||||||
linux-azure-5.3 |
| ||||||||||||
linux-azure-5.4 |
| ||||||||||||
linux-azure-5.8 |
| ||||||||||||
linux-azure-6.2 |
| ||||||||||||
linux-azure-6.5 |
| ||||||||||||
linux-azure-edge |
| ||||||||||||
linux-azure-fde |
| ||||||||||||
linux-azure-fde-5.15 |
| ||||||||||||
linux-azure-fde-5.19 |
| ||||||||||||
linux-azure-fde-6.2 |
| ||||||||||||
linux-azure-fips |
| ||||||||||||
linux-bluefield |
| ||||||||||||
linux-fips |
| ||||||||||||
linux-gcp |
| ||||||||||||
linux-gcp-4.15 |
| ||||||||||||
linux-gcp-5.11 |
| ||||||||||||
linux-gcp-5.13 |
| ||||||||||||
linux-gcp-5.15 |
| ||||||||||||
linux-gcp-5.19 |
| ||||||||||||
linux-gcp-5.3 |
| ||||||||||||
linux-gcp-5.4 |
| ||||||||||||
linux-gcp-5.8 |
| ||||||||||||
linux-gcp-6.2 |
| ||||||||||||
linux-gcp-6.5 |
| ||||||||||||
linux-gcp-fips |
| ||||||||||||
linux-gke |
| ||||||||||||
linux-gke-4.15 |
| ||||||||||||
linux-gke-5.15 |
| ||||||||||||
linux-gke-5.4 |
| ||||||||||||
linux-gkeop |
| ||||||||||||
linux-gkeop-5.15 |
| ||||||||||||
linux-gkeop-5.4 |
| ||||||||||||
linux-hwe |
| ||||||||||||
linux-hwe-5.11 |
| ||||||||||||
linux-hwe-5.13 |
| ||||||||||||
linux-hwe-5.15 |
| ||||||||||||
linux-hwe-5.19 |
| ||||||||||||
linux-hwe-5.4 |
| ||||||||||||
linux-hwe-5.8 |
| ||||||||||||
linux-hwe-6.2 |
| ||||||||||||
linux-hwe-6.5 |
| ||||||||||||
linux-hwe-6.8 |
| ||||||||||||
linux-hwe-edge |
| ||||||||||||
linux-ibm |
| ||||||||||||
linux-ibm-5.15 |
| ||||||||||||
linux-ibm-5.4 |
| ||||||||||||
linux-intel |
| ||||||||||||
linux-intel-5.13 |
| ||||||||||||
linux-intel-iot-realtime |
| ||||||||||||
linux-intel-iotg |
| ||||||||||||
linux-intel-iotg-5.15 |
| ||||||||||||
linux-iot |
| ||||||||||||
linux-kvm |
| ||||||||||||
linux-lowlatency |
| ||||||||||||
linux-lowlatency-hwe-5.15 |
| ||||||||||||
linux-lowlatency-hwe-5.19 |
| ||||||||||||
linux-lowlatency-hwe-6.2 |
| ||||||||||||
linux-lowlatency-hwe-6.5 |
| ||||||||||||
linux-lowlatency-hwe-6.8 |
| ||||||||||||
linux-lts-xenial |
| ||||||||||||
linux-nvidia |
| ||||||||||||
linux-nvidia-6.2 |
| ||||||||||||
linux-nvidia-6.5 |
| ||||||||||||
linux-nvidia-6.8 |
| ||||||||||||
linux-nvidia-lowlatency |
| ||||||||||||
linux-oem |
| ||||||||||||
linux-oem-5.10 |
| ||||||||||||
linux-oem-5.13 |
| ||||||||||||
linux-oem-5.14 |
| ||||||||||||
linux-oem-5.17 |
| ||||||||||||
linux-oem-5.6 |
| ||||||||||||
linux-oem-6.0 |
| ||||||||||||
linux-oem-6.1 |
| ||||||||||||
linux-oem-6.5 |
| ||||||||||||
linux-oem-6.8 |
| ||||||||||||
linux-oracle |
| ||||||||||||
linux-oracle-5.0 |
| ||||||||||||
linux-oracle-5.11 |
| ||||||||||||
linux-oracle-5.13 |
| ||||||||||||
linux-oracle-5.15 |
| ||||||||||||
linux-oracle-5.3 |
| ||||||||||||
linux-oracle-5.4 |
| ||||||||||||
linux-oracle-5.8 |
| ||||||||||||
linux-oracle-6.5 |
| ||||||||||||
linux-raspi |
| ||||||||||||
linux-raspi-5.4 |
| ||||||||||||
linux-raspi-realtime |
| ||||||||||||
linux-raspi2 |
| ||||||||||||
linux-realtime |
| ||||||||||||
linux-riscv |
| ||||||||||||
linux-riscv-5.11 |
| ||||||||||||
linux-riscv-5.15 |
| ||||||||||||
linux-riscv-5.19 |
| ||||||||||||
linux-riscv-5.8 |
| ||||||||||||
linux-riscv-6.5 |
| ||||||||||||
linux-riscv-6.8 |
| ||||||||||||
linux-starfive-5.19 |
| ||||||||||||
linux-starfive-6.2 |
| ||||||||||||
linux-starfive-6.5 |
| ||||||||||||
linux-xilinx-zynqmp |
|
Common Weakness Enumeration
References