CVE-2022-49700

Source
https://cve.org/CVERecord?id=CVE-2022-49700
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49700.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49700
Downstream
Related
Published
2025-02-26T02:24:20.878Z
Modified
2026-04-02T08:27:50.709316Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
mm/slub: add missing TID updates on slab deactivation
Details

In the Linux kernel, the following vulnerability has been resolved:

mm/slub: add missing TID updates on slab deactivation

The fastpath in slaballocnode() assumes that c->slab is stable as long as the TID stays the same. However, two places in _slaballoc() currently don't update the TID when deactivating the CPU slab.

If multiple operations race the right way, this could lead to an object getting lost; or, in an even more unlikely situation, it could even lead to an object being freed onto the wrong slab's freelist, messing up the inuse counter and eventually causing a page to be freed to the page allocator while it still contains slab objects.

(I haven't actually tested these cases though, this is just based on looking at the code. Writing testcases for this stuff seems like it'd be a pain...)

The race leading to state inconsistency is (all operations on the same CPU and kmem_cache):

  • task A: begin doslabfree():
    • read TID
    • read pcpu freelist (==NULL)
    • check slab == c->slab (true)
  • [PREEMPT A->B]
  • task B: begin slaballocnode():
    • fastpath fails (c->freelist is NULL)
    • enter slaballoc()
    • slubgetcpuptr() (disables preemption)
    • enter __slaballoc()
    • take locallockirqsave()
    • read c->freelist as NULL
    • getfreelist() returns NULL
    • write c->slab = NULL
    • drop localunlockirqrestore()
    • goto newslab
    • slubpercpupartial() is NULL
    • getpartial() returns NULL
    • slubputcpuptr() (enables preemption)
  • [PREEMPT B->A]
  • task A: finish doslabfree():
    • thiscpucmpxchg_double() succeeds()
    • [CORRUPT STATE: c->slab==NULL, c->freelist!=NULL]

From there, the object on c->freelist will get lost if task B is allowed to continue from here: It will proceed to the retryloadslab label, set c->slab, then jump to load_freelist, which clobbers c->freelist.

But if we instead continue as follows, we get worse corruption:

  • task A: run _slabfree() on object from other struct slab:
    • CPUPARTIALFREE case (slab was on no list, is now on pcpu partial)
  • task A: run slaballocnode() with NUMA node constraint:
    • fastpath fails (c->slab is NULL)
    • call slaballoc()
    • slubgetcpuptr() (disables preemption)
    • enter __slaballoc()
    • c->slab is NULL: goto newslab
    • slubpercpupartial() is non-NULL
    • set c->slab to slubpercpupartial(c)
    • [CORRUPT STATE: c->slab points to slab-1, c->freelist has objects from slab-2]
    • goto redo
    • nodematch() fails
    • goto deactivateslab
    • existing c->freelist is passed into deactivateslab()
    • inuse count of slab-1 is decremented to account for object from slab-2

At this point, the inuse count of slab-1 is 1 lower than it should be. This means that if we free all allocated objects in slab-1 except for one, SLUB will think that slab-1 is completely unused, and may free its page, leading to use-after-free.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49700.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
03e404af26dc2ea0d278d7a342de0aab394793ce
Fixed
308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082
Fixed
d6a597450e686d4c6388bd3cdcb17224b4dae7f0
Fixed
e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7
Fixed
e7e3e90d671078455a3a08189f89d85b3da2de9e
Fixed
6c32496964da0dc230cea763a0e934b2e02dabd5
Fixed
0515cc9b6b24877f59b222ade704bfaa42caa2a6
Fixed
197e257da473c725dfe47759c3ee02f2398d8ea5
Fixed
eeaa345e128515135ccb864c04482180c08e3259

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49700.json"