From a5eb7cbb367fc78859c94dc39301b06bef09eaf3 Mon Sep 17 00:00:00 2001 From: anolis-bot Date: Thu, 22 May 2025 18:47:38 +0800 Subject: [PATCH] create cve CVE-2025-22113 --- data/cve/CVE-2025-22113.json | 71 ++++++++++++++++++++++++++++++++++++ 1 file changed, 71 insertions(+) create mode 100644 data/cve/CVE-2025-22113.json diff --git a/data/cve/CVE-2025-22113.json b/data/cve/CVE-2025-22113.json new file mode 100644 index 0000000000..fa4ab2b28b --- /dev/null +++ b/data/cve/CVE-2025-22113.json @@ -0,0 +1,71 @@ +{ + "id": 27937, + "cve_id": "CVE-2025-22113", + "creator": null, + "publisher": "cve-center", + "publish_third_party_token": "cve-center", + "publish_date": "2025-04-16 23:16:05", + "cvss": { + "nvd_cvss": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "openanolis_cvss": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, + "product": [ + { + "product_id": 6, + "name_version": "Anolis OS 7", + "product_package_info": { + "src": [ + { + "rpm_name": "kernel:4.19", + "rpm_status": "unaffected" + } + ] + } + }, + { + "product_id": 5, + "name_version": "Anolis OS 8", + "product_package_info": { + "src": [ + { + "rpm_name": "kernel:5.10", + "rpm_status": "unaffected" + } + ] + } + }, + { + "product_id": 7, + "name_version": "Anolis OS 23", + "product_package_info": { + "src": [ + { + "rpm_name": "kernel:6.6", + "rpm_status": "unaffected" + } + ] + } + } + ], + "affected_packages": [ + "kernel:6.6", + "kernel:5.10", + "kernel:4.19" + ], + "score": 5.5, + "severity": "Moderate", + "status": 1, + "source": "Mitre", + "cve_source_link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22113", + "abstract": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid journaling sb update on error if journal is destroying\n\nPresently we always BUG_ON if trying to start a transaction on a journal marked\nwith JBD2_UNMOUNT, since this should never happen. However, while ltp running\nstress tests, it was observed that in case of some error handling paths, it is\npossible for update_super_work to start a transaction after the journal is\ndestroyed eg:\n\n(umount)\next4_kill_sb\n kill_block_super\n generic_shutdown_super\n sync_filesystem /* commits all txns */\n evict_inodes\n /* might start a new txn */\n ext4_put_super\n\tflush_work(&sbi->s_sb_upd_work) /* flush the workqueue */\n jbd2_journal_destroy\n journal_kill_thread\n journal->j_flags |= JBD2_UNMOUNT;\n jbd2_journal_commit_transaction\n jbd2_journal_get_descriptor_buffer\n jbd2_journal_bmap\n ext4_journal_bmap\n ext4_map_blocks\n ...\n ext4_inode_error\n ext4_handle_error\n schedule_work(&sbi->s_sb_upd_work)\n\n /* work queue kicks in */\n update_super_work\n jbd2_journal_start\n start_this_handle\n BUG_ON(journal->j_flags &\n JBD2_UNMOUNT)\n\nHence, introduce a new mount flag to indicate journal is destroying and only do\na journaled (and deferred) update of sb if this flag is not set. Otherwise, just\nfallback to an un-journaled commit.\n\nFurther, in the journal destroy path, we have the following sequence:\n\n 1. Set mount flag indicating journal is destroying\n 2. force a commit and wait for it\n 3. flush pending sb updates\n\nThis sequence is important as it ensures that, after this point, there is no sb\nupdate that might be journaled so it is safe to update the sb outside the\njournal. (To avoid race discussed in 2d01ddc86606)\n\nAlso, we don't need a similar check in ext4_grp_locked_error since it is only\ncalled from mballoc and AFAICT it would be always valid to schedule work here.", + "description": null, + "issue": null, + "acknowledgements": null, + "acknowledgements_en": null, + "reference": null, + "diagnose": null, + "statement": null, + "mitigation": null, + "update_user": null, + "errata": [] +} \ No newline at end of file -- Gitee