跳转到帖子

Ubuntu: (CVE-2022-48731): linux vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2022-48731): linux vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
06/20/2024
Created
11/21/2024
Added
11/19/2024
Modified
02/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved: mm/kmemleak: avoid scanning potential huge holes When using devm_request_free_mem_region() and devm_memremap_pages() to add ZONE_DEVICE memory, if requested free mem region's end pfn were huge(e.g., 0x400000000), the node_end_pfn() will be also huge (see move_pfn_range_to_zone()).Thus it creates a huge hole between node_start_pfn() and node_end_pfn(). We found on some AMD APUs, amdkfd requested such a free mem region and created a huge hole.In such a case, following code snippet was just doing busy test_bit() looping on the huge hole. for (pfn = start_pfn; pfn < end_pfn; pfn++) { struct page *page = pfn_to_online_page(pfn); if (!page) continue; ... } So we got a soft lockup: watchdog: BUG: soft lockup - CPU#6 stuck for 26s! [bash:1221] CPU: 6 PID: 1221 Comm: bash Not tainted 5.15.0-custom #1 RIP: 0010:pfn_to_online_page+0x5/0xd0 Call Trace: ? kmemleak_scan+0x16a/0x440 kmemleak_write+0x306/0x3a0 ? common_file_perm+0x72/0x170 full_proxy_write+0x5c/0x90 vfs_write+0xb9/0x260 ksys_write+0x67/0xe0 __x64_sys_write+0x1a/0x20 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae I did some tests with the patch. (1) amdgpu module unloaded before the patch: real0m0.976s user0m0.000s sys 0m0.968s after the patch: real0m0.981s user0m0.000s sys 0m0.973s (2) amdgpu module loaded before the patch: real0m35.365s user0m0.000s sys 0m35.354s after the patch: real0m1.049s user0m0.000s sys 0m1.042s

Solution(s)

  • ubuntu-upgrade-linux
  • ubuntu-upgrade-linux-aws
  • ubuntu-upgrade-linux-aws-5-4
  • ubuntu-upgrade-linux-aws-fips
  • ubuntu-upgrade-linux-azure
  • ubuntu-upgrade-linux-azure-5-4
  • ubuntu-upgrade-linux-azure-fips
  • ubuntu-upgrade-linux-bluefield
  • ubuntu-upgrade-linux-fips
  • ubuntu-upgrade-linux-gcp
  • ubuntu-upgrade-linux-gcp-5-4
  • ubuntu-upgrade-linux-gcp-fips
  • ubuntu-upgrade-linux-gkeop
  • ubuntu-upgrade-linux-hwe-5-4
  • ubuntu-upgrade-linux-ibm
  • ubuntu-upgrade-linux-ibm-5-4
  • ubuntu-upgrade-linux-intel-iotg-5-15
  • ubuntu-upgrade-linux-iot
  • ubuntu-upgrade-linux-kvm
  • ubuntu-upgrade-linux-oracle
  • ubuntu-upgrade-linux-oracle-5-4
  • ubuntu-upgrade-linux-raspi
  • ubuntu-upgrade-linux-raspi-5-4

References

  • https://attackerkb.com/topics/cve-2022-48731
  • CVE - 2022-48731
  • https://git.kernel.org/linus/c10a0f877fe007021d70f9cada240f42adc2b5db
  • https://git.kernel.org/stable/c/352715593e81b917ce1b321e794549815b850134
  • https://git.kernel.org/stable/c/a5389c80992f0001ee505838fe6a8b20897ce96e
  • https://git.kernel.org/stable/c/c10a0f877fe007021d70f9cada240f42adc2b5db
  • https://git.kernel.org/stable/c/cebb0aceb21ad91429617a40e3a17444fabf1529
  • https://git.kernel.org/stable/c/d3533ee20e9a0e2e8f60384da7450d43d1c63d1a
  • https://www.cve.org/CVERecord?id=CVE-2022-48731
View more
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…