Skip to main content

CVE-2022-48902: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48902cvecve-2022-48902
Published: Thu Aug 22 2024 (08/22/2024, 01:30:18 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not WARN_ON() if we have PageError set Whenever we do any extent buffer operations we call assert_eb_page_uptodate() to complain loudly if we're operating on an non-uptodate page. Our overnight tests caught this warning earlier this week WARNING: CPU: 1 PID: 553508 at fs/btrfs/extent_io.c:6849 assert_eb_page_uptodate+0x3f/0x50 CPU: 1 PID: 553508 Comm: kworker/u4:13 Tainted: G W 5.17.0-rc3+ #564 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014 Workqueue: btrfs-cache btrfs_work_helper RIP: 0010:assert_eb_page_uptodate+0x3f/0x50 RSP: 0018:ffffa961440a7c68 EFLAGS: 00010246 RAX: 0017ffffc0002112 RBX: ffffe6e74453f9c0 RCX: 0000000000001000 RDX: ffffe6e74467c887 RSI: ffffe6e74453f9c0 RDI: ffff8d4c5efc2fc0 RBP: 0000000000000d56 R08: ffff8d4d4a224000 R09: 0000000000000000 R10: 00015817fa9d1ef0 R11: 000000000000000c R12: 00000000000007b1 R13: ffff8d4c5efc2fc0 R14: 0000000001500000 R15: 0000000001cb1000 FS: 0000000000000000(0000) GS:ffff8d4dbbd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff31d3448d8 CR3: 0000000118be8004 CR4: 0000000000370ee0 Call Trace: extent_buffer_test_bit+0x3f/0x70 free_space_test_bit+0xa6/0xc0 load_free_space_tree+0x1f6/0x470 caching_thread+0x454/0x630 ? rcu_read_lock_sched_held+0x12/0x60 ? rcu_read_lock_sched_held+0x12/0x60 ? rcu_read_lock_sched_held+0x12/0x60 ? lock_release+0x1f0/0x2d0 btrfs_work_helper+0xf2/0x3e0 ? lock_release+0x1f0/0x2d0 ? finish_task_switch.isra.0+0xf9/0x3a0 process_one_work+0x26d/0x580 ? process_one_work+0x580/0x580 worker_thread+0x55/0x3b0 ? process_one_work+0x580/0x580 kthread+0xf0/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x1f/0x30 This was partially fixed by c2e39305299f01 ("btrfs: clear extent buffer uptodate when we fail to write it"), however all that fix did was keep us from finding extent buffers after a failed writeout. It didn't keep us from continuing to use a buffer that we already had found. In this case we're searching the commit root to cache the block group, so we can start committing the transaction and switch the commit root and then start writing. After the switch we can look up an extent buffer that hasn't been written yet and start processing that block group. Then we fail to write that block out and clear Uptodate on the page, and then we start spewing these errors. Normally we're protected by the tree lock to a certain degree here. If we read a block we have that block read locked, and we block the writer from locking the block before we submit it for the write. However this isn't necessarily fool proof because the read could happen before we do the submit_bio and after we locked and unlocked the extent buffer. Also in this particular case we have path->skip_locking set, so that won't save us here. We'll simply get a block that was valid when we read it, but became invalid while we were using it. What we really want is to catch the case where we've "read" a block but it's not marked Uptodate. On read we ClearPageError(), so if we're !Uptodate and !Error we know we didn't do the right thing for reading the page. Fix this by checking !Uptodate && !Error, this way we will not complain if our buffer gets invalidated while we're using it, and we'll maintain the spirit of the check which is to make sure we have a fully in-cache block while we're messing with it.

AI-Powered Analysis

AILast updated: 06/30/2025, 23:27:44 UTC

Technical Analysis

CVE-2022-48902 is a vulnerability identified in the Linux kernel's Btrfs filesystem implementation. The issue arises from improper handling of extent buffers during extent buffer operations, specifically related to the assertion assert_eb_page_uptodate(). This assertion is designed to ensure that operations are only performed on pages marked as 'uptodate' (fully cached and valid). The vulnerability manifests when the kernel attempts to operate on a page that is no longer marked as uptodate but does not have an error flag set, leading to warnings and potential instability. The root cause is a race condition where a block that was valid when initially read becomes invalidated during processing, especially when path->skip_locking is set, which bypasses certain locking protections. This can cause the kernel to continue using stale or invalid buffers, potentially leading to data corruption or kernel warnings that could escalate to system instability. The issue was partially addressed in a prior commit that cleared the uptodate flag after a failed write, but it did not prevent the continued use of already found buffers. The fix involves enhancing the check to allow for buffers that become invalidated during use without triggering warnings, by verifying both the uptodate and error flags. This vulnerability affects Linux kernel versions containing the specified commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and likely impacts systems using Btrfs as their filesystem. There are no known exploits in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2022-48902 depends largely on their use of the Linux operating system with Btrfs filesystems. Btrfs is commonly used in enterprise and cloud environments for its advanced features like snapshots and checksums. The vulnerability could lead to kernel warnings, potential data corruption, or system instability, which in critical infrastructure or production environments could cause downtime or data loss. Organizations relying on Linux servers for file storage, virtualization hosts, or container platforms that utilize Btrfs may experience degraded reliability or require emergency patching. While no direct remote exploitation is indicated, the risk exists for local privilege escalation or denial of service if attackers can induce the race condition or trigger the invalid buffer usage. This could affect data integrity and availability, especially in environments with high I/O workloads or complex transaction commits. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to maintain system stability and data integrity.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions that include the fix for CVE-2022-48902. Since the vulnerability relates to the Btrfs filesystem, administrators should audit systems using Btrfs and consider temporary mitigations such as reducing concurrent write operations or disabling features that trigger the vulnerable code paths if feasible. Monitoring kernel logs for warnings related to assert_eb_page_uptodate can help detect attempts to exploit or trigger the issue. For critical systems, implementing kernel live patching solutions can minimize downtime during patch deployment. Additionally, organizations should ensure robust backup and recovery procedures are in place to mitigate potential data corruption. Security teams should also review system configurations to avoid setting path->skip_locking unless necessary, as it contributes to the vulnerability. Finally, maintaining strict access controls to limit local user capabilities can reduce the risk of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T06:06:23.291Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6556

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 6/30/2025, 11:27:44 PM

Last updated: 8/12/2025, 3:56:32 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats