mctp:在 RCU 读端锁下执行路由查找 (CVE-2023-52483)

admin 2024-03-01 10:33:27 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
mctp:在 RCU 读端锁下执行路由查找 (CVE-2023-52483)

CVE编号

CVE-2023-52483

利用情况

暂无

补丁情况

N/A

披露时间

2024-02-29
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: mctp: perform route lookups under a RCU read-side lock Our current route lookups (mctp_route_lookup and mctp_route_lookup_null) traverse the net's route list without the RCU read lock held. This means the route lookup is subject to preemption, resulting in an potential grace period expiry, and so an eventual kfree() while we still have the route pointer. Add the proper read-side critical section locks around the route lookups, preventing premption and a possible parallel kfree. The remaining net->mctp.routes accesses are already under a rcu_read_lock, or protected by the RTNL for updates. Based on an analysis from Sili Luo <[email protected]>, where introducing a delay in the route lookup could cause a UAF on simultaneous sendmsg() and route deletion.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a
https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4
https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c
https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0