RDMA/rtrs-clt:从活动列表中删除会话后销毁 sysfs (CVE-2021-47026)

admin 2024-03-01 10:39:06 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
RDMA/rtrs-clt:从活动列表中删除会话后销毁 sysfs (CVE-2021-47026)

CVE编号

CVE-2021-47026

利用情况

暂无

补丁情况

N/A

披露时间

2024-02-28
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs-clt: destroy sysfs after removing session from active list A session can be removed dynamically by sysfs interface "remove_path" that eventually calls rtrs_clt_remove_path_from_sysfs function. The current rtrs_clt_remove_path_from_sysfs first removes the sysfs interfaces and frees sess->stats object. Second it removes the session from the active list. Therefore some functions could access non-connected session and access the freed sess->stats object even-if they check the session status before accessing the session. For instance rtrs_clt_request and get_next_path_min_inflight check the session status and try to send IO to the session. The session status could be changed when they are trying to send IO but they could not catch the change and update the statistics information in sess->stats object, and generate use-after-free problem. (see: "RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its stats") This patch changes the rtrs_clt_remove_path_from_sysfs to remove the session from the active session list and then destroy the sysfs interfaces. Each function still should check the session status because closing or error recovery paths can change the status.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/676171f9405dcaa45a33d18241c32f387dbaae39
https://git.kernel.org/stable/c/7f4a8592ff29f19c5a2ca549d0973821319afaad
https://git.kernel.org/stable/c/b64415c6b3476cf9fa4d0aea3807065b8403a937
https://git.kernel.org/stable/c/d3cca8067d43dfee4a3535c645b55f618708dccb
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_10 linux * Up to (excluding) 4.19.304-1
运行在以下环境
系统 debian_11 linux * Up to (excluding) 5.10.38-1
运行在以下环境
系统 debian_12 linux * Up to (excluding) 5.10.38-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0