Bug 2060606 (CVE-2022-0850)
| Summary: | CVE-2022-0850 kernel: information leak in copy_page_to_iter() in iov_iter.c | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Rohit Keshri <rkeshri> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED WONTFIX | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, bhu, brdeoliv, bskeggs, carnil, chwhite, dhoward, dvlasenk, fhrbata, fpacheco, hdegoede, hkrzesin, jarod, jarodwilson, jburrell, jeremy, jfaracco, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jpazdziora, jshortt, jstancek, jwboyer, jwyatt, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, lzampier, masami256, mchehab, nmurray, ptalbert, qzhao, rvrbovsk, scweaver, steved, swood, vkumar, walters, williams, zulinx86 |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | Flags: | jpazdziora:
needinfo?
(rkeshri) |
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | kernel 5.14 rc1 | Doc Type: | If docs needed, set a value |
| Doc Text: |
An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-03-04 20:49:35 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2047348 | ||
|
Description
Rohit Keshri
2022-03-03 20:32:54 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-0850 Should this CVE be rejected? I'm not sure as the traces do not completely correspond. There is on one hand https://syzkaller.appspot.com/bug?id=602bc454598b9bc1186ea9f927f6225ef64a397b which was auto-closed as invalid, and https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8 which though is fixed 5.14-rc1 (with ce3aba43599f0b50adbebff133df8d08a3d5fffe). Thanks for clarifying. Hello, looking closely at both the traces we will notice they are similar occurrences and relates to a similar problem. Below is the trace in common ~~~ copy_page_to_iter_iovec lib/iov_iter.c:212 [inline] copy_page_to_iter+0x77a/0x1ac0 lib/iov_iter.c:846 generic_file_buffered_read mm/filemap.c:2185 [inline] generic_file_read_iter+0x3469/0x4430 mm/filemap.c:2362 blkdev_read_iter+0x20d/0x270 fs/block_dev.c:1936 call_read_iter include/linux/fs.h:1801 [inline] new_sync_read fs/read_write.c:406 [inline] ~~~ thank you. (In reply to Rohit Keshri from comment #4) > Hello, looking closely at both the traces we will notice they are similar > occurrences and relates to a similar problem. > > Below is the trace in common > ~~~ > copy_page_to_iter_iovec lib/iov_iter.c:212 [inline] > copy_page_to_iter+0x77a/0x1ac0 lib/iov_iter.c:846 > generic_file_buffered_read mm/filemap.c:2185 [inline] > generic_file_read_iter+0x3469/0x4430 mm/filemap.c:2362 > blkdev_read_iter+0x20d/0x270 fs/block_dev.c:1936 > call_read_iter include/linux/fs.h:1801 [inline] > new_sync_read fs/read_write.c:406 [inline] > ~~~ > > thank you. Hello, could this be reopened and proper investigation of the code in various RHEL kernel versions done? This bugzilla is WONTFIX indicating the vulnerability is present but we decided not to fix it ... but the CVE page https://access.redhat.com/security/cve/CVE-2022-0850 says Not affected which indicates to the world that the faulty code is not in the product. We might need to figure out which one it is exactly. Thank you, Jan |