In the Linux kernel, the following vulnerability has been resolved:
XArray: Fix xascreaterange() when multi-order entry present
If there is already an entry present that is of order >= XACHUNKSHIFT when we call xascreaterange(), xascreaterange() will misinterpret that entry as a node and dereference xa_node->parent, generally leading to a crash that looks something like this:
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 32 Comm: khugepaged Not tainted 5.17.0-rc8-syzkaller-00003-g56e337f2cf13 #0 RIP: 0010:xaparentlocked include/linux/xarray.h:1207 [inline] RIP: 0010:xascreaterange+0x2d9/0x6e0 lib/xarray.c:725
It's deterministically reproducable once you know what the problem is, but producing it in a live kernel requires khugepaged to hit a race. While the problem has been present since xascreaterange() was introduced, I'm not aware of a way to hit it before the page cache was converted to use multi-index entries.
[
{
"id": "CVE-2022-49152-1bb6b1d4",
"signature_type": "Function",
"digest": {
"length": 912.0,
"function_hash": "279580651357910770193350271706372840124"
},
"signature_version": "v1",
"target": {
"function": "check_create_range",
"file": "lib/test_xarray.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18f13edf3424b3b61814b69d5269b2e14584800c",
"deprecated": false
},
{
"id": "CVE-2022-49152-201f4f59",
"signature_type": "Function",
"digest": {
"length": 901.0,
"function_hash": "168462413731251386788828017925001027626"
},
"signature_version": "v1",
"target": {
"function": "xas_create_range",
"file": "lib/xarray.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18f13edf3424b3b61814b69d5269b2e14584800c",
"deprecated": false
},
{
"id": "CVE-2022-49152-416aef65",
"signature_type": "Line",
"digest": {
"line_hashes": [
"236673303370232155483406321399916443377",
"302966042083978661609530475600328596886",
"194941478556462271455606108017519218742",
"127865027862046429326916198526544196764",
"337834453572243824018765013483992273278",
"263063904871549353171626482576552912513",
"38233224495242408979650463536233543149"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "lib/test_xarray.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18f13edf3424b3b61814b69d5269b2e14584800c",
"deprecated": false
},
{
"id": "CVE-2022-49152-71ee8259",
"signature_type": "Function",
"digest": {
"length": 901.0,
"function_hash": "168462413731251386788828017925001027626"
},
"signature_version": "v1",
"target": {
"function": "xas_create_range",
"file": "lib/xarray.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e3c658055c002900982513e289398a1aad4a488",
"deprecated": false
},
{
"id": "CVE-2022-49152-72670dc2",
"signature_type": "Line",
"digest": {
"line_hashes": [
"236673303370232155483406321399916443377",
"302966042083978661609530475600328596886",
"194941478556462271455606108017519218742",
"127865027862046429326916198526544196764",
"337834453572243824018765013483992273278",
"263063904871549353171626482576552912513",
"38233224495242408979650463536233543149"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "lib/test_xarray.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e3c658055c002900982513e289398a1aad4a488",
"deprecated": false
},
{
"id": "CVE-2022-49152-a7024f70",
"signature_type": "Line",
"digest": {
"line_hashes": [
"338020990777416942166546940713349574374",
"286833840448209916202213219334795824304",
"293580865110768879107887752964411041770",
"120970443224700431308221753571526366595"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "lib/xarray.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18f13edf3424b3b61814b69d5269b2e14584800c",
"deprecated": false
},
{
"id": "CVE-2022-49152-da6f58d0",
"signature_type": "Function",
"digest": {
"length": 912.0,
"function_hash": "279580651357910770193350271706372840124"
},
"signature_version": "v1",
"target": {
"function": "check_create_range",
"file": "lib/test_xarray.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e3c658055c002900982513e289398a1aad4a488",
"deprecated": false
},
{
"id": "CVE-2022-49152-e90bfc43",
"signature_type": "Line",
"digest": {
"line_hashes": [
"338020990777416942166546940713349574374",
"286833840448209916202213219334795824304",
"293580865110768879107887752964411041770",
"120970443224700431308221753571526366595"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "lib/xarray.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e3c658055c002900982513e289398a1aad4a488",
"deprecated": false
}
]