CVE-2022-48628

Source
https://cve.org/CVERecord?id=CVE-2022-48628
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48628.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48628
Downstream
Related
Published
2024-03-02T21:52:14.626Z
Modified
2026-03-13T06:48:17.669281Z
Summary
ceph: drop messages from MDS when unmounting
Details

In the Linux kernel, the following vulnerability has been resolved:

ceph: drop messages from MDS when unmounting

When unmounting all the dirty buffers will be flushed and after the last osd request is finished the last reference of the icount will be released. Then it will flush the dirty cap/snap to MDSs, and the unmounting won't wait the possible acks, which will ihold the inodes when updating the metadata locally but makes no sense any more, of this. This will make the evictinodes() to skip these inodes.

If encrypt is enabled the kernel generate a warning when removing the encrypt keys when the skipped inodes still hold the keyring:

WARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscryptdestroykeyring+0x7e/0xd0 CPU: 4 PID: 168846 Comm: umount Tainted: G S 6.1.0-rc5-ceph-g72ead199864c #1 Hardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015 RIP: 0010:fscryptdestroykeyring+0x7e/0xd0 RSP: 0018:ffffc9000b277e28 EFLAGS: 00010202 RAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00 RDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000 RBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000 R10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40 R13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000 FS: 00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> genericshutdownsuper+0x47/0x120 killanonsuper+0x14/0x30 cephkillsb+0x36/0x90 [ceph] deactivatelockedsuper+0x29/0x60 cleanupmnt+0xb8/0x140 taskworkrun+0x67/0xb0 exittousermodeprepare+0x23d/0x240 syscallexittousermode+0x25/0x60 dosyscall64+0x40/0x80 entrySYSCALL64after_hwframe+0x63/0xcd RIP: 0033:0x7fd83dc39e9b

Later the kernel will crash when iput() the inodes and dereferencing the "sb->smasterkeys", which has been released by the genericshutdownsuper().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48628.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9030aaf9bf0a1eee47a154c316c789e959638b0f
Fixed
89744b64914426cbabceb3d8a149176b5dafdfb5
Fixed
47f82395f04a976d4fa97de7f2acffa1c1096571
Fixed
e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48628.json"