109 Star 69 Fork 293

src-openEuler/kernel

 / 详情

CVE-2022-48969

Done
CVE和安全问题 owner
Opened this issue  
2024-10-22 08:01

一、漏洞信息
漏洞编号:CVE-2022-48969
漏洞归属组件:kernel
漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0,6.1.0,6.1.14,6.1.19,6.1.5,6.1.6,6.1.8,6.4.0,6.6.0
CVSS V3.0分值:
BaseScore:5.5 Medium
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
漏洞简述:
In the Linux kernel, the following vulnerability has been resolved:xen-netfront: Fix NULL sring after live migrationA NAPI is setup for each network sring to poll data to kernelThe sring with source host is destroyed before live migration andnew sring with target host is setup after live migration.The NAPI for the old sring is not deleted until setup new sringwith target host after migration. With busy_poll/busy_read enabled,the NAPI can be polled before got deleted when resume VM.BUG: unable to handle kernel NULL pointer dereference at0000000000000008IP: xennet_poll+0xae/0xd20PGD 0 P4D 0Oops: 0000 [#1] SMP PTICall Trace: finish_task_switch+0x71/0x230 timerqueue_del+0x1d/0x40 hrtimer_try_to_cancel+0xb5/0x110 xennet_alloc_rx_buffers+0x2a0/0x2a0 napi_busy_loop+0xdb/0x270 sock_poll+0x87/0x90 do_sys_poll+0x26f/0x580 tracing_map_insert+0x1d4/0x2f0 event_hist_trigger+0x14a/0x260 finish_task_switch+0x71/0x230 __schedule+0x256/0x890 recalc_sigpending+0x1b/0x50 xen_sched_clock+0x15/0x20 __rb_reserve_next+0x12d/0x140 ring_buffer_lock_reserve+0x123/0x3d0 event_triggers_call+0x87/0xb0 trace_event_buffer_commit+0x1c4/0x210 xen_clocksource_get_cycles+0x15/0x20 ktime_get_ts64+0x51/0xf0 SyS_ppoll+0x160/0x1a0 SyS_ppoll+0x160/0x1a0 do_syscall_64+0x73/0x130 entry_SYSCALL_64_after_hwframe+0x41/0xa6...RIP: xennet_poll+0xae/0xd20 RSP: ffffb4f041933900CR2: 0000000000000008---[ end trace f8601785b354351c ]---xen frontend should remove the NAPIs for the old srings before livemigration as the bond srings are destroyedThere is a tiny window between the srings are set to NULL andthe NAPIs are disabled, It is safe as the NAPI threads are stillfrozen at that time
漏洞公开时间:2024-10-22 04:15:09
漏洞创建时间:2024-10-22 08:01:55
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2022-48969

更多参考(点击展开)
参考来源 参考链接 来源链接
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/99859947517e446058ad7243ee81d2f9801fa3dd
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/d50b7914fae04d840ce36491d22133070b18cca9
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/e6860c889f4ad50b6ab696f5ea154295d72cf27a
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/e6e897d4fe2f89c0bd94600a40bedf5e6e75e050
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/ed773dd798bf720756d20021b8d8a4a3d7184bda
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/f2dd60fd3fe98bd36a91b0c6e10bfe9d66258f84
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48969 https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2022-48969 https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://git.kernel.org/stable/c/99859947517e446058ad7243ee81d2f9801fa3dd https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://git.kernel.org/stable/c/d50b7914fae04d840ce36491d22133070b18cca9 https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://git.kernel.org/stable/c/e6860c889f4ad50b6ab696f5ea154295d72cf27a https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://git.kernel.org/stable/c/e6e897d4fe2f89c0bd94600a40bedf5e6e75e050 https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://git.kernel.org/stable/c/ed773dd798bf720756d20021b8d8a4a3d7184bda https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://git.kernel.org/stable/c/f2dd60fd3fe98bd36a91b0c6e10bfe9d66258f84 https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2022/CVE-2022-48969.mbox https://bugzilla.suse.com/show_bug.cgi?id=1232026
suse_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2320658 https://bugzilla.suse.com/show_bug.cgi?id=1232026

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://git.kernel.org/stable/c/99859947517e446058ad7243ee81d2f9801fa3dd nvd
https://git.kernel.org/stable/c/d50b7914fae04d840ce36491d22133070b18cca9 nvd
https://git.kernel.org/stable/c/e6860c889f4ad50b6ab696f5ea154295d72cf27a nvd
https://git.kernel.org/stable/c/e6e897d4fe2f89c0bd94600a40bedf5e6e75e050 nvd
https://git.kernel.org/stable/c/ed773dd798bf720756d20021b8d8a4a3d7184bda nvd
https://git.kernel.org/stable/c/f2dd60fd3fe98bd36a91b0c6e10bfe9d66258f84 nvd

二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:xen-netfront: Fix NULL sring after live migrationA NAPI is setup for each network sring to poll data to kernelThe sring with source host is destroyed before live migration andnew sring with target host is setup after live migration.The NAPI for the old sring is not deleted until setup new sringwith target host after migration. With busy_poll/busy_read enabled,the NAPI can be polled before got deleted when resume VM.BUG: unable to handle kernel NULL pointer dereference at0000000000000008IP: xennet_poll+0xae/0xd20PGD 0 P4D 0Oops: 0000 [#1] SMP PTICall Trace: finish_task_switch+0x71/0x230 timerqueue_del+0x1d/0x40 hrtimer_try_to_cancel+0xb5/0x110 xennet_alloc_rx_buffers+0x2a0/0x2a0 napi_busy_loop+0xdb/0x270 sock_poll+0x87/0x90 do_sys_poll+0x26f/0x580 tracing_map_insert+0x1d4/0x2f0 event_hist_trigger+0x14a/0x260 finish_task_switch+0x71/0x230 __schedule+0x256/0x890 recalc_sigpending+0x1b/0x50 xen_sched_clock+0x15/0x20 __rb_reserve_next+0x12d/0x140 ring_buffer_lock_reserve+0x123/0x3d0 event_triggers_call+0x87/0xb0 trace_event_buffer_commit+0x1c4/0x210 xen_clocksource_get_cycles+0x15/0x20 ktime_get_ts64+0x51/0xf0 SyS_ppoll+0x160/0x1a0 SyS_ppoll+0x160/0x1a0 do_syscall_64+0x73/0x130 entry_SYSCALL_64_after_hwframe+0x41/0xa6...RIP: xennet_poll+0xae/0xd20 RSP: ffffb4f041933900CR2: 0000000000000008---[ end trace f8601785b354351c ]---xen frontend should remove the NAPIs for the old srings before livemigration as the bond srings are destroyedThere is a tiny window between the srings are set to NULL andthe NAPIs are disabled, It is safe as the NAPI threads are stillfrozen at that time
openEuler评分:
5.5
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(4.19.90):受影响
2.openEuler-22.03-LTS-SP1(5.10.0):受影响
3.openEuler-22.03-LTS-SP3(5.10.0):不受影响
4.openEuler-22.03-LTS-SP4(5.10.0):不受影响
5.master(6.6.0):不受影响
6.openEuler-24.03-LTS(6.6.0):不受影响
7.openEuler-24.03-LTS-Next(6.6.0):不受影响
8.openEuler-24.03-LTS-SP1(6.6.0):不受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4(4.19.90):否
2.openEuler-22.03-LTS-SP1(5.10.0):否
3.openEuler-22.03-LTS-SP3(5.10.0):否
4.master(6.6.0):否
5.openEuler-24.03-LTS(6.6.0):否
6.openEuler-24.03-LTS-Next(6.6.0):否
7.openEuler-22.03-LTS-SP4(5.10.0):否
8.openEuler-24.03-LTS-SP1(6.6.0):否

原因说明:
1.openEuler-22.03-LTS-SP1(5.10.0):正常修复
2.openEuler-20.03-LTS-SP4(4.19.90):不修复-超出修复范围
3.openEuler-22.03-LTS-SP3(5.10.0):不受影响-漏洞代码不存在
4.openEuler-22.03-LTS-SP4(5.10.0):不受影响-漏洞代码不存在
5.master(6.6.0):不受影响-漏洞代码不存在
6.openEuler-24.03-LTS(6.6.0):不受影响-漏洞代码不存在
7.openEuler-24.03-LTS-Next(6.6.0):不受影响-漏洞代码不存在
8.openEuler-24.03-LTS-SP1(6.6.0):不受影响-漏洞代码不存在

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2024-2491

Comments (14)

openeuler-ci-bot createdCVE和安全问题 5 months ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
5 months ago
Expand operation logs

Hi openeuler-ci-bot, welcome to the openEuler Community.
I'm the Bot here serving you. You can find the instructions on how to interact with me at Here.
If you have any questions, please contact the SIG: Kernel, and any of the maintainers.

openeuler-ci-bot added
 
sig/Kernel
label
5 months ago
openeuler-ci-bot changed description 5 months ago
openeuler-ci-bot changed description 5 months ago
openeuler-ci-bot set start time to 2024-10-22 5 months ago
openeuler-ci-bot set deadline to 2024-11-21 5 months ago
openeuler-ci-bot set priority to Secondary 5 months ago

CVE-2022-48969

影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: Fix NULL sring after live migration

A NAPI is setup for each network sring to poll data to kernel
The sring with source host is destroyed before live migration and
new sring with target host is setup after live migration.
The NAPI for the old sring is not deleted until setup new sring
with target host after migration. With busy_poll/busy_read enabled,
the NAPI can be polled before got deleted when resume VM.

BUG: unable to handle kernel NULL pointer dereference at
0000000000000008
IP: xennet_poll+0xae/0xd20
PGD 0 P4D 0
Oops: 0000 [#1] SMP PTI
Call Trace:
finish_task_switch+0x71/0x230
timerqueue_del+0x1d/0x40
hrtimer_try_to_cancel+0xb5/0x110
xennet_alloc_rx_buffers+0x2a0/0x2a0
napi_busy_loop+0xdb/0x270
sock_poll+0x87/0x90
do_sys_poll+0x26f/0x580
tracing_map_insert+0x1d4/0x2f0
event_hist_trigger+0x14a/0x260

finish_task_switch+0x71/0x230
__schedule+0x256/0x890
recalc_sigpending+0x1b/0x50
xen_sched_clock+0x15/0x20
__rb_reserve_next+0x12d/0x140
ring_buffer_lock_reserve+0x123/0x3d0
event_triggers_call+0x87/0xb0
trace_event_buffer_commit+0x1c4/0x210
xen_clocksource_get_cycles+0x15/0x20
ktime_get_ts64+0x51/0xf0
SyS_ppoll+0x160/0x1a0
SyS_ppoll+0x160/0x1a0
do_syscall_64+0x73/0x130
entry_SYSCALL_64_after_hwframe+0x41/0xa6
...
RIP: xennet_poll+0xae/0xd20 RSP: ffffb4f041933900
CR2: 0000000000000008
---[ end trace f8601785b354351c ]---

xen frontend should remove the NAPIs for the old srings before live
migration as the bond srings are destroyed

There is a tiny window between the srings are set to NULL and
the NAPIs are disabled, It is safe as the NAPI threads are still
frozen at that time

openEuler评分:(评分和向量)
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4:受影响
2.openEuler-22.03-LTS-SP1:受影响
3.openEuler-22.03-LTS-SP3:不受影响
4.openEuler-22.03-LTS-SP4:不受影响
5.master(6.1.0):不受影响
6.openEuler-24.03-LTS:不受影响
7.openEuler-24.03-LTS-Next:不受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4:否
2.openEuler-22.03-LTS-SP1:否
3.openEuler-22.03-LTS-SP3:否
4.master(6.1.0):否
5.openEuler-24.03-LTS:否
6.openEuler-24.03-LTS-Next:否
7.openEuler-22.03-LTS-SP4:否

openeuler-ci-bot changed description 5 months ago
openeuler-ci-bot changed start time from 2024-10-22 to 2024-10-29 5 months ago
openeuler-ci-bot changed deadline from 2024-11-21 to 2024-11-28 5 months ago
ci-robot related pull requestopenEuler/kernel Pull Request !13431 4 months ago
ci-robot through merging Pull Request !13431: xen-netfront: Fix NULL sring after live migration changed issue state from 待办的 to 已完成 4 months ago
openeuler-ci-bot changed issue state from 已完成 to 待办的 4 months ago
openeuler-ci-bot changed description 4 months ago

@ci-robot 4.受影响版本排查(受影响/不受影响)=> 没有分析或未按正确格式填写,涉及分支: [openEuler-24.03-LTS-SP1]
请确认分析内容的准确性,待分析内容请填写完整,否则将无法关闭当前issue.

openeuler-ci-bot removed
 
CVE/UNFIXED
label
4 months ago
openeuler-ci-bot removed
 
sig/Kernel
label
4 months ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
4 months ago
openeuler-ci-bot added
 
sig/Kernel
label
4 months ago
Li Nan related pull requestsrc-openEuler/kernel Pull Request !1839 4 months ago
Li Nan through merging Pull Request !1839: release 5.10.0-136.103.0 changed issue state from 待办的 to 已完成 4 months ago
openeuler-ci-bot changed issue state from 已完成 to 待办的 4 months ago
openeuler-ci-bot removed
 
CVE/UNFIXED
label
4 months ago
openeuler-ci-bot removed
 
sig/Kernel
label
4 months ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
4 months ago
openeuler-ci-bot added
 
sig/Kernel
label
4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
郭梦琪 changed issue state from 待办的 to 已完成 4 months ago
openeuler-ci-bot removed
 
CVE/UNFIXED
label
4 months ago
openeuler-ci-bot removed
 
sig/Kernel
label
4 months ago
openeuler-ci-bot added
 
CVE/FIXED
label
4 months ago
openeuler-ci-bot added
 
sig/Kernel
label
4 months ago
郭梦琪 changed issue state from 已完成 to 待办的 4 months ago
openeuler-ci-bot removed
 
CVE/FIXED
label
4 months ago
openeuler-ci-bot removed
 
sig/Kernel
label
4 months ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
4 months ago
openeuler-ci-bot added
 
sig/Kernel
label
4 months ago
郭梦琪 changed issue state from 待办的 to 已完成 4 months ago
openeuler-ci-bot removed
 
CVE/UNFIXED
label
4 months ago
openeuler-ci-bot removed
 
sig/Kernel
label
4 months ago
openeuler-ci-bot added
 
CVE/FIXED
label
4 months ago
openeuler-ci-bot added
 
sig/Kernel
label
4 months ago
openeuler-ci-bot changed description 3 months ago
openeuler-ci-bot changed description 3 months ago

Sign in to comment

Status
Assignees
Projects
Pull Requests
Successfully merging a pull request will close this issue.
Duration (hours)
Planed to start   -   Planed to end
-
Top level
Priority
Branches
参与者(3)
5329419 openeuler ci bot 1632792936 hulk-robot-zhixiuzhou 郭梦琪-guo-mengqi
1
https://gitee.com/src-openeuler/kernel.git
git@gitee.com:src-openeuler/kernel.git
src-openeuler
kernel
kernel

Search