CVE-2022-49300

Source
https://cve.org/CVERecord?id=CVE-2022-49300
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49300.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49300
Downstream
Related
Published
2025-02-26T02:10:35.594Z
Modified
2026-04-02T08:27:29.034232Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
nbd: fix race between nbd_alloc_config() and module removal
Details

In the Linux kernel, the following vulnerability has been resolved:

nbd: fix race between nbdallocconfig() and module removal

When nbd module is being removing, nbdallocconfig() may be called concurrently by nbdgenlconnect(), although trymoduleget() will return false, but nbdallocconfig() doesn't handle it.

The race may lead to the leak of nbdconfig and its related resources (e.g, recvworkq) and oops in nbdreadstat() due to the unload of nbd module as shown below:

BUG: kernel NULL pointer dereference, address: 0000000000000040 Oops: 0000 [#1] SMP PTI CPU: 5 PID: 13840 Comm: kworker/u17:33 Not tainted 5.14.0+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) Workqueue: knbd16-recv recvwork [nbd] RIP: 0010:nbdreadstat.cold+0x130/0x1a4 [nbd] Call Trace: recvwork+0x3b/0xb0 [nbd] processonework+0x1ed/0x390 workerthread+0x4a/0x3d0 kthread+0x12a/0x150 retfrom_fork+0x22/0x30

Fixing it by checking the return value of trymoduleget() in nbdallocconfig(). As nbdallocconfig() may return ERRPTR(-ENODEV), assign nbd->config only when nbdalloc_config() succeeds to ensure the value of nbd->config is binary (valid or NULL).

Also adding a debug message to check the reference counter of nbd_config during module removal.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49300.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ea8d10802ec4c153a6e21eebaf412e2abd29736
Fixed
165cf2e0019fa6cedc75b456490c41494c34abb4
Fixed
2573f2375b64280be977431701ed5d33b75b9ad0
Fixed
8a7da4ced236ce6637fe70f14ca18e718d4bf9e9
Fixed
122e4adaff2439f1cc18cc7e931980fa7560df5c
Fixed
71c142f910da44421213ade601bcbd23ceae19fa
Fixed
2888fa41985f93ed0a6837cfbb06bcbfd7fa2314
Fixed
d09525720dd5201756f698bee1076de9aefd4602
Fixed
c55b2b983b0fa012942c3eb16384b2b722caa810

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49300.json"