跳转到帖子

SUSE: CVE-2022-48734: SUSE Linux Security Advisory

recommended_posts

发布于
  • Members

SUSE: CVE-2022-48734: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
06/20/2024
Created
08/16/2024
Added
08/09/2024
Modified
01/28/2025

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix deadlock between quota disable and qgroup rescan worker Quota disable ioctl starts a transaction before waiting for the qgroup rescan worker completes. However, this wait can be infinite and results in deadlock because of circular dependency among the quota disable ioctl, the qgroup rescan worker and the other task with transaction such as block group relocation task. The deadlock happens with the steps following: 1) Task A calls ioctl to disable quota. It starts a transaction and waits for qgroup rescan worker completes. 2) Task B such as block group relocation task starts a transaction and joins to the transaction that task A started. Then task B commits to the transaction. In this commit, task B waits for a commit by task A. 3) Task C as the qgroup rescan worker starts its job and starts a transaction. In this transaction start, task C waits for completion of the transaction that task A started and task B committed. This deadlock was found with fstests test case btrfs/115 and a zoned null_blk device. The test case enables and disables quota, and the block group reclaim was triggered during the quota disable by chance. The deadlock was also observed by running quota enable and disable in parallel with 'btrfs balance' command on regular null_blk devices. An example report of the deadlock: [372.469894] INFO: task kworker/u16:6:103 blocked for more than 122 seconds. [372.479944] Not tainted 5.16.0-rc8 #7 [372.485067] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [372.493898] task:kworker/u16:6 state:D stack:0 pid:103 ppid: 2 flags:0x00004000 [372.503285] Workqueue: btrfs-qgroup-rescan btrfs_work_helper [btrfs] [372.510782] Call Trace: [372.514092]<TASK> [372.521684]__schedule+0xb56/0x4850 [372.530104]? io_schedule_timeout+0x190/0x190 [372.538842]? lockdep_hardirqs_on+0x7e/0x100 [372.547092]? _raw_spin_unlock_irqrestore+0x3e/0x60 [372.555591]schedule+0xe0/0x270 [372.561894]btrfs_commit_transaction+0x18bb/0x2610 [btrfs] [372.570506]? btrfs_apply_pending_changes+0x50/0x50 [btrfs] [372.578875]? free_unref_page+0x3f2/0x650 [372.585484]? finish_wait+0x270/0x270 [372.591594]? release_extent_buffer+0x224/0x420 [btrfs] [372.599264]btrfs_qgroup_rescan_worker+0xc13/0x10c0 [btrfs] [372.607157]? lock_release+0x3a9/0x6d0 [372.613054]? btrfs_qgroup_account_extent+0xda0/0xda0 [btrfs] [372.620960]? do_raw_spin_lock+0x11e/0x250 [372.627137]? rwlock_bug.part.0+0x90/0x90 [372.633215]? lock_is_held_type+0xe4/0x140 [372.639404]btrfs_work_helper+0x1ae/0xa90 [btrfs] [372.646268]process_one_work+0x7e9/0x1320 [372.652321]? lock_release+0x6d0/0x6d0 [372.658081]? pwq_dec_nr_in_flight+0x230/0x230 [372.664513]? rwlock_bug.part.0+0x90/0x90 [372.670529]worker_thread+0x59e/0xf90 [372.676172]? process_one_work+0x1320/0x1320 [372.682440]kthread+0x3b9/0x490 [372.687550]? _raw_spin_unlock_irq+0x24/0x50 [372.693811]? set_kthread_struct+0x100/0x100 [372.700052]ret_from_fork+0x22/0x30 [372.705517]</TASK> [372.709747] INFO: task btrfs-transacti:2347 blocked for more than 123 seconds. [372.729827] Not tainted 5.16.0-rc8 #7 [372.745907] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [372.767106] task:btrfs-transacti state:D stack:0 pid: 2347 ppid: 2 flags:0x00004000 [372.787776] Call Trace: [372.801652]<TASK> [372.812961]__schedule+0xb56/0x4850 [372.830011]? io_schedule_timeout+0x190/0x190 [372.852547]? lockdep_hardirqs_on+0x7e/0x100 [372.871761]? _raw_spin_unlock_irqrestore+0x3e/0x60 [372.886792]schedule+0xe0/0x270 [372.901685]wait_current_trans+0x22c/0x310 [btrfs] [372.919743]? btrfs_put_transaction+0x3d0/0x3d0 [btrfs] [372.938923]? finish_wait+0x270/0x270 [372.959085]? join_transaction+0xc7 ---truncated---

Solution(s)

  • suse-upgrade-cluster-md-kmp-azure
  • suse-upgrade-cluster-md-kmp-rt
  • suse-upgrade-dlm-kmp-azure
  • suse-upgrade-dlm-kmp-rt
  • suse-upgrade-gfs2-kmp-azure
  • suse-upgrade-gfs2-kmp-rt
  • suse-upgrade-kernel-azure
  • suse-upgrade-kernel-azure-devel
  • suse-upgrade-kernel-azure-extra
  • suse-upgrade-kernel-azure-livepatch-devel
  • suse-upgrade-kernel-azure-optional
  • suse-upgrade-kernel-azure-vdso
  • suse-upgrade-kernel-devel-azure
  • suse-upgrade-kernel-devel-rt
  • suse-upgrade-kernel-rt
  • suse-upgrade-kernel-rt-devel
  • suse-upgrade-kernel-rt-extra
  • suse-upgrade-kernel-rt-livepatch
  • suse-upgrade-kernel-rt-livepatch-devel
  • suse-upgrade-kernel-rt-optional
  • suse-upgrade-kernel-rt-vdso
  • suse-upgrade-kernel-rt_debug
  • suse-upgrade-kernel-rt_debug-devel
  • suse-upgrade-kernel-rt_debug-livepatch-devel
  • suse-upgrade-kernel-rt_debug-vdso
  • suse-upgrade-kernel-source-azure
  • suse-upgrade-kernel-source-rt
  • suse-upgrade-kernel-syms-azure
  • suse-upgrade-kernel-syms-rt
  • suse-upgrade-kselftests-kmp-azure
  • suse-upgrade-kselftests-kmp-rt
  • suse-upgrade-ocfs2-kmp-azure
  • suse-upgrade-ocfs2-kmp-rt
  • suse-upgrade-reiserfs-kmp-azure
  • suse-upgrade-reiserfs-kmp-rt

References

  • https://attackerkb.com/topics/cve-2022-48734
  • CVE - 2022-48734
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…