• CVE-2021-47496

发布时间: 2024年6月20日

修改时间: 2024年7月2日

概要

In the Linux kernel, the following vulnerability has been resolved: net/tls: Fix flipped sign in tls_err_abort() calls sk-&gt;sk_err appears to expect a positive value, a convention that ktls doesn't always follow and that leads to memory corruption in other code. For instance, [kworker] tls_encrypt_done(..., err=<negative error from crypto request&gt;) tls_err_abort(.., err) sk-&gt;sk_err = err; [task] splice_from_pipe_feed ... tls_sw_do_sendpage if (sk-&gt;sk_err) { ret = -sk-&gt;sk_err; // ret is positive splice_from_pipe_feed (continued) ret = actor(...) // ret is still positive and interpreted as bytes // written, resulting in underflow of buf-&gt;len and // sd-&gt;len, leading to huge buf-&gt;offset and bogus // addresses computed in later calls to actor() Fix all tls_err_abort() callers to pass a negative error code consistently and centralize the error-prone sign flip there, throwing in a warning to catch future misuse and uninlining the function so it really does only warn once.

CVSS v3 指标

NVD openEuler
Confidentiality High
Attack Vector Local
CVSS评分 N/A 7.8
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Integrity High
User Interaction None
Availability High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4787 kernel security update 2024年6月21日

影响产品

产品 状态
KY3.4-5A kernel Fixed
KY3.5.2 kernel Unaffected
V6 kernel Unaffected