io_uring/poll:如果发生多重请求轮询竞争,则不要重新发布(CVE-2023-52895)

admin 2024-08-23 00:15:53 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
io_uring/poll:如果发生多重请求轮询竞争,则不要重新发布(CVE-2023-52895)

CVE编号

CVE-2023-52895

利用情况

暂无

补丁情况

N/A

披露时间

2024-08-21
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: don't reissue in case of poll race on multishot request A previous commit fixed a poll race that can occur, but it's only applicable for multishot requests. For a multishot request, we can safely ignore a spurious wakeup, as we never leave the waitqueue to begin with. A blunt reissue of a multishot armed request can cause us to leak a buffer, if they are ring provided. While this seems like a bug in itself, it's not really defined behavior to reissue a multishot request directly. It's less efficient to do so as well, and not required to rearm anything like it is for singleshot poll requests.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/36fc7317cdb16cfeae0f879916995037bb615ac4
https://git.kernel.org/stable/c/8caa03f10bf92cb8657408a6ece6a8a73f96ce13
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_11 linux * Up to (excluding) 5.10.223-1
运行在以下环境
系统 debian_12 linux * Up to (excluding) 6.1.8-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0