跳转到帖子

SUSE: CVE-2022-48758: SUSE Linux Security Advisory

recommended_posts

发布于
  • Members

SUSE: CVE-2022-48758: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
06/20/2024
Created
08/16/2024
Added
08/09/2024
Modified
08/09/2024

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() The bnx2fc_destroy() functions are removing the interface before calling destroy_work. This results multiple WARNings from sysfs_remove_group() as the controller rport device attributes are removed too early. Replace the fcoe_port's destroy_work queue. It's not needed. The problem is easily reproducible with the following steps. Example: $ dmesg -w & $ systemctl enable --now fcoe $ fipvlan -s -c ens2f1 $ fcoeadm -d ens2f1.802 [583.464488] host2: libfc: Link down on port (7500a1) [583.472651] bnx2fc: 7500a1 - rport not created Yet!! [583.490468] ------------[ cut here ]------------ [583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0' [583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80 [583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ... [583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1 [583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013 [584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc] [584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80 [584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ... [584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282 [584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000 [584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0 [584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00 [584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400 [584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004 [584.355379] FS:0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000 [584.394419] CS:0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0 [584.454888] Call Trace: [584.466108]device_del+0xb2/0x3e0 [584.481701]device_unregister+0x13/0x60 [584.501306]bsg_unregister_queue+0x5b/0x80 [584.522029]bsg_remove_queue+0x1c/0x40 [584.541884]fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc] [584.573823]process_one_work+0x1e3/0x3b0 [584.592396]worker_thread+0x50/0x3b0 [584.609256]? rescuer_thread+0x370/0x370 [584.628877]kthread+0x149/0x170 [584.643673]? set_kthread_struct+0x40/0x40 [584.662909]ret_from_fork+0x22/0x30 [584.680002] ---[ end trace 53575ecefa942ece ]---

Solution(s)

  • suse-upgrade-cluster-md-kmp-azure
  • suse-upgrade-cluster-md-kmp-rt
  • suse-upgrade-dlm-kmp-azure
  • suse-upgrade-dlm-kmp-rt
  • suse-upgrade-gfs2-kmp-azure
  • suse-upgrade-gfs2-kmp-rt
  • suse-upgrade-kernel-64kb
  • suse-upgrade-kernel-64kb-devel
  • suse-upgrade-kernel-azure
  • suse-upgrade-kernel-azure-base
  • suse-upgrade-kernel-azure-devel
  • suse-upgrade-kernel-azure-extra
  • suse-upgrade-kernel-azure-livepatch-devel
  • suse-upgrade-kernel-azure-optional
  • suse-upgrade-kernel-azure-vdso
  • suse-upgrade-kernel-default
  • suse-upgrade-kernel-default-base
  • suse-upgrade-kernel-default-devel
  • suse-upgrade-kernel-default-extra
  • suse-upgrade-kernel-default-man
  • suse-upgrade-kernel-devel
  • suse-upgrade-kernel-devel-azure
  • suse-upgrade-kernel-devel-rt
  • suse-upgrade-kernel-docs
  • suse-upgrade-kernel-macros
  • suse-upgrade-kernel-obs-build
  • suse-upgrade-kernel-preempt
  • suse-upgrade-kernel-preempt-devel
  • suse-upgrade-kernel-rt
  • suse-upgrade-kernel-rt-devel
  • suse-upgrade-kernel-rt-extra
  • suse-upgrade-kernel-rt-livepatch
  • suse-upgrade-kernel-rt-livepatch-devel
  • suse-upgrade-kernel-rt-optional
  • suse-upgrade-kernel-rt-vdso
  • suse-upgrade-kernel-rt_debug
  • suse-upgrade-kernel-rt_debug-devel
  • suse-upgrade-kernel-rt_debug-livepatch-devel
  • suse-upgrade-kernel-rt_debug-vdso
  • suse-upgrade-kernel-source
  • suse-upgrade-kernel-source-azure
  • suse-upgrade-kernel-source-rt
  • suse-upgrade-kernel-syms
  • suse-upgrade-kernel-syms-azure
  • suse-upgrade-kernel-syms-rt
  • suse-upgrade-kernel-zfcpdump
  • suse-upgrade-kselftests-kmp-azure
  • suse-upgrade-kselftests-kmp-rt
  • suse-upgrade-ocfs2-kmp-azure
  • suse-upgrade-ocfs2-kmp-rt
  • suse-upgrade-reiserfs-kmp-azure
  • suse-upgrade-reiserfs-kmp-default
  • suse-upgrade-reiserfs-kmp-rt

References

  • https://attackerkb.com/topics/cve-2022-48758
  • CVE - 2022-48758
  • 查看数 701
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…