• 公告ID (KylinSec-SA-2025-2719)

摘要:

kernel security update

安全等级: High

公告ID: KylinSec-SA-2025-2719

发布日期: 2025年6月11日

关联CVE: CVE-2022-49266   CVE-2022-49711   CVE-2022-49444  

  • 详细介绍

1. 漏洞描述

   

The Linux Kernel, the operating system core itself.

Security Fix(es):

In the Linux kernel, the following vulnerability has been resolved:

block: fix rq-qos breakage from skipping rq_qos_done_bio()

a647a524a467 ("block: don't call rq_qos_ops->done_bio if the bio isn't
tracked") made bio_endio() skip rq_qos_done_bio() if BIO_TRACKED is not set.
While this fixed a potential oops, it also broke blk-iocost by skipping the
done_bio callback for merged bios.

Before, whether a bio goes through rq_qos_throttle() or rq_qos_merge(),
rq_qos_done_bio() would be called on the bio on completion with BIO_TRACKED
distinguishing the former from the latter. rq_qos_done_bio() is not called
for bios which wenth through rq_qos_merge(). This royally confuses
blk-iocost as the merged bios never finish and are considered perpetually
in-flight.

One reliably reproducible failure mode is an intermediate cgroup geting
stuck active preventing its children from being activated due to the
leaf-only rule, leading to loss of control. The following is from
resctl-bench protection scenario which emulates isolating a web server like
workload from a memory bomb run on an iocost configuration which should
yield a reasonable level of protection.

# cat /sys/block/nvme2n1/device/model
Samsung SSD 970 PRO 512GB
# cat /sys/fs/cgroup/io.cost.model
259:0 ctrl=user model=linear rbps=834913556 rseqiops=93622 rrandiops=102913 wbps=618985353 wseqiops=72325 wrandiops=71025
# cat /sys/fs/cgroup/io.cost.qos
259:0 enable=1 ctrl=user rpct=95.00 rlat=18776 wpct=95.00 wlat=8897 min=60.00 max=100.00
# resctl-bench -m 29.6G -r out.json run protection::scenario=mem-hog,loops=1
...
Memory Hog Summary
==================

IO Latency: R p50=242u:336u/2.5m p90=794u:1.4m/7.5m p99=2.7m:8.0m/62.5m max=8.0m:36.4m/350m
W p50=221u:323u/1.5m p90=709u:1.2m/5.5m p99=1.5m:2.5m/9.5m max=6.9m:35.9m/350m

Isolation and Request Latency Impact Distributions:

min p01 p05 p10 p25 p50 p75 p90 p95 p99 max mean stdev
isol% 15.90 15.90 15.90 40.05 57.24 59.07 60.01 74.63 74.63 90.35 90.35 58.12 15.82
lat-imp% 0 0 0 0 0 4.55 14.68 15.54 233.5 548.1 548.1 53.88 143.6

Result: isol=58.12:15.82% lat_imp=53.88%:143.6 work_csv=100.0% missing=3.96%

The isolation result of 58.12% is close to what this device would show
without any IO control.

Fix it by introducing a new flag BIO_QOS_MERGED to mark merged bios and
calling rq_qos_done_bio() on them too. For consistency and clarity, rename
BIO_TRACKED to BIO_QOS_THROTTLED. The flag checks are moved into
rq_qos_done_bio() so that it's next to the code paths that set the flags.

With the patch applied, the above same benchmark shows:

# resctl-bench -m 29.6G -r out.json run protection::scenario=mem-hog,loops=1
...
Memory Hog Summary
==================

IO Latency: R p50=123u:84.4u/985u p90=322u:256u/2.5m p99=1.6m:1.4m/9.5m max=11.1m:36.0m/350m
W p50=429u:274u/995u p90=1.7m:1.3m/4.5m p99=3.4m:2.7m/11.5m max=7.9m:5.9m/26.5m

Isolation and Request Latency Impact Distributions:

min p01 p05 p10 p25 p50 p75 p90 p95 p99 max mean stdev
isol% 84.91 84.91 89.51 90.73 92.31 94.49 96.36 98.04 98.71 100.0 100.0 94.42 2.81
lat-imp% 0 0 0 0 0 2.81 5.73 11.11 13.92 17.53 22.61 4.10 4.68

Result: isol=94.42:2.81% lat_imp=4.10%:4.68 work_csv=58.34% missing=0%(CVE-2022-49266)

In the Linux kernel, the following vulnerability has been resolved:

module: fix [e_shstrndx].sh_size=0 OOB access

It is trivial to craft a module to trigger OOB access in this line:

if (info->secstrings[strhdr->sh_size - 1] != '\0') {

BUG: unable to handle page fault for address: ffffc90000aa0fff
PGD 100000067 P4D 100000067 PUD 100066067 PMD 10436f067 PTE 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 7 PID: 1215 Comm: insmod Not tainted 5.18.0-rc5-00007-g9bf578647087-dirty #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
RIP: 0010:load_module+0x19b/0x2391

[rebased patch onto modules-next](CVE-2022-49444)

In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()

In fsl_mc_bus_remove(), mc->root_mc_bus_dev->mc_io is passed to
fsl_destroy_mc_io(). However, mc->root_mc_bus_dev is already freed in
fsl_mc_device_remove(). Then reference to mc->root_mc_bus_dev->mc_io
triggers KASAN use-after-free. To avoid the use-after-free, keep the
reference to mc->root_mc_bus_dev->mc_io in a local variable and pass to
fsl_destroy_mc_io().

This patch needs rework to apply to kernels older than v5.15.(CVE-2022-49711)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-49266 KY3.5.3 kernel Fixed
CVE-2022-49266 KY3.5.2 kernel Fixed
CVE-2022-49711 KY3.5.3 kernel Fixed
CVE-2022-49711 KY3.5.2 kernel Fixed
CVE-2022-49444 KY3.5.3 kernel Fixed
CVE-2022-49444 KY3.5.2 kernel Fixed

3. 影响组件

    kernel

4. 修复版本

   

KY3.5.3

软件名称 架构 版本号
bpftool x86_64 5.10.0-236.0.0.rt62.63.ky3_5
kernel x86_64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-devel x86_64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-headers x86_64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-source x86_64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-tools x86_64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-tools-devel x86_64 5.10.0-216.0.0.115.kb9.ky3_5
perf x86_64 5.10.0-236.0.0.rt62.63.ky3_5
python3-perf x86_64 5.10.0-236.0.0.rt62.63.ky3_5
bpftool aarch64 5.10.0-236.0.0.rt62.63.ky3_5
kernel aarch64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-devel aarch64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-headers aarch64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-source aarch64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-tools aarch64 5.10.0-216.0.0.115.kb9.ky3_5
kernel-tools-devel aarch64 5.10.0-216.0.0.115.kb9.ky3_5
perf aarch64 5.10.0-236.0.0.rt62.63.ky3_5
python3-perf aarch64 5.10.0-236.0.0.rt62.63.ky3_5

KY3.5.2

软件名称 架构 版本号
bpftool x86_64 5.10.0-216.0.0.115.kb13.ky3_5
kernel x86_64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-devel x86_64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-headers x86_64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-source x86_64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-tools x86_64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-tools-devel x86_64 5.10.0-216.0.0.115.kb13.ky3_5
perf x86_64 5.10.0-216.0.0.115.kb13.ky3_5
python3-perf x86_64 5.10.0-216.0.0.115.kb13.ky3_5
bpftool aarch64 5.10.0-216.0.0.115.kb13.ky3_5
kernel aarch64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-devel aarch64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-headers aarch64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-source aarch64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-tools aarch64 5.10.0-216.0.0.115.kb13.ky3_5
kernel-tools-devel aarch64 5.10.0-216.0.0.115.kb13.ky3_5
perf aarch64 5.10.0-216.0.0.115.kb13.ky3_5
python3-perf aarch64 5.10.0-216.0.0.115.kb13.ky3_5

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.5.3:

x86_64:

     bpftool   

     kernel   

     kernel-devel   

     kernel-headers   

     kernel-source   

     kernel-tools   

     kernel-tools-devel   

     perf   

     python3-perf   

aarch64:

     bpftool   

     kernel   

     kernel-devel   

     kernel-headers   

     kernel-source   

     kernel-tools   

     kernel-tools-devel   

     perf   

     python3-perf   

KY3.5.2:

x86_64:

     bpftool   

     kernel   

     kernel-devel   

     kernel-headers   

     kernel-source   

     kernel-tools   

     kernel-tools-devel   

     perf   

     python3-perf   

aarch64:

     bpftool   

     kernel   

     kernel-devel   

     kernel-headers   

     kernel-source   

     kernel-tools   

     kernel-tools-devel   

     perf   

     python3-perf   

上一篇:KylinSec-SA-2025-2718 下一篇:KylinSec-SA-2025-2720