Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-48658
HistoryApr 28, 2024 - 12:00 a.m.

CVE-2022-48658

2024-04-2800:00:00
ubuntu.com
ubuntu.com
4
linux
kernel
vulnerability
fix
flush_cpu_slab
__free_slab
workqueue
wq_mem_reclaim
nvme_delete_ctrl_work
dependency issue

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.2%

In the Linux kernel, the following vulnerability has been resolved: mm:
slub: fix flush_cpu_slab()/__free_slab() invocations in task context.
Commit 5a836bf6b09f (“mm: slub: move flush_cpu_slab() invocations
__free_slab() invocations out of IRQ context”) moved all flush_cpu_slab()
invocations to the global workqueue to avoid a problem related with
deactivate_slab()/__free_slab() being called from an IRQ context on
PREEMPT_RT kernels. When the flush_all_cpu_locked() function is called from
a task context it may happen that a workqueue with WQ_MEM_RECLAIM bit set
ends up flushing the global workqueue, this will cause a dependency issue.
workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core]
is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab WARNING: CPU: 37 PID: 410
at kernel/workqueue.c:2637 check_flush_dependency+0x10a/0x120 Workqueue:
nvme-delete-wq nvme_delete_ctrl_work [nvme_core] RIP:
0010:check_flush_dependency+0x10a/0x120[ 453.262125] Call Trace:
__flush_work.isra.0+0xbf/0x220 ? __queue_work+0x1dc/0x420
flush_all_cpus_locked+0xfb/0x120 __kmem_cache_shutdown+0x2b/0x320
kmem_cache_destroy+0x49/0x100 bioset_exit+0x143/0x190
blk_release_queue+0xb9/0x100 kobject_cleanup+0x37/0x130
nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc] nvme_free_ctrl+0x1ac/0x2b0
[nvme_core] Fix this bug by creating a workqueue for the flush operation
with the WQ_MEM_RECLAIM bit set.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.2%