• CVE-2021-47536

发布时间: 2024年7月10日

修改时间: 2025年4月13日

概要

In the Linux kernel, the following vulnerability has been resolved: net/smc: fix wrong list_del in smc_lgr_cleanup_early smc_lgr_cleanup_early() meant to delete the link group from the link group list, but it deleted the list head by mistake. This may cause memory corruption since we didn't remove the real link group from the list and later memseted the link group structure. We got a list corruption panic when testing: [ &nbsp;231.277259] list_del corruption. prev-&gt;next should be ffff8881398a8000, but was 0000000000000000 [ &nbsp;231.278222] ------------[ cut here ]------------ [ &nbsp;231.278726] kernel BUG at lib/list_debug.c:53! [ &nbsp;231.279326] invalid opcode: 0000 [#1] SMP NOPTI [ &nbsp;231.279803] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.46+ #435 [ &nbsp;231.280466] Hardware name: Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014 [ &nbsp;231.281248] Workqueue: events smc_link_down_work [ &nbsp;231.281732] RIP: 0010:__list_del_entry_valid+0x70/0x90 [ &nbsp;231.282258] Code: 4c 60 82 e8 7d cc 6a 00 0f 0b 48 89 fe 48 c7 c7 88 4c 60 82 e8 6c cc 6a 00 0f 0b 48 89 fe 48 c7 c7 c0 4c 60 82 e8 5b cc 6a 00 <0f&gt; 0b 48 89 fe 48 c7 c7 00 4d 60 82 e8 4a cc 6a 00 0f 0b cc cc cc [ &nbsp;231.284146] RSP: 0018:ffffc90000033d58 EFLAGS: 00010292 [ &nbsp;231.284685] RAX: 0000000000000054 RBX: ffff8881398a8000 RCX: 0000000000000000 [ &nbsp;231.285415] RDX: 0000000000000001 RSI: ffff88813bc18040 RDI: ffff88813bc18040 [ &nbsp;231.286141] RBP: ffffffff8305ad40 R08: 0000000000000003 R09: 0000000000000001 [ &nbsp;231.286873] R10: ffffffff82803da0 R11: ffffc90000033b90 R12: 0000000000000001 [ &nbsp;231.287606] R13: 0000000000000000 R14: ffff8881398a8000 R15: 0000000000000003 [ &nbsp;231.288337] FS: &nbsp;0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000 [ &nbsp;231.289160] CS: &nbsp;0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ &nbsp;231.289754] CR2: 0000000000e72058 CR3: 000000010fa96006 CR4: 00000000003706f0 [ &nbsp;231.290485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ &nbsp;231.291211] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ &nbsp;231.291940] Call Trace: [ &nbsp;231.292211] &nbsp;smc_lgr_terminate_sched+0x53/0xa0 [ &nbsp;231.292677] &nbsp;smc_switch_conns+0x75/0x6b0 [ &nbsp;231.293085] &nbsp;? update_load_avg+0x1a6/0x590 [ &nbsp;231.293517] &nbsp;? ttwu_do_wakeup+0x17/0x150 [ &nbsp;231.293907] &nbsp;? update_load_avg+0x1a6/0x590 [ &nbsp;231.294317] &nbsp;? newidle_balance+0xca/0x3d0 [ &nbsp;231.294716] &nbsp;smcr_link_down+0x50/0x1a0 [ &nbsp;231.295090] &nbsp;? __wake_up_common_lock+0x77/0x90 [ &nbsp;231.295534] &nbsp;smc_link_down_work+0x46/0x60 [ &nbsp;231.295933] &nbsp;process_one_work+0x18b/0x350

CVSS v3 指标

NVD openEuler
Confidentiality None
Attack Vector Local
CVSS评分 N/A 5.5
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Integrity None
User Interaction None
Availability High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3084 In the Linux kernel, the following vulnerability has been resolved: net/smc: fix wrong list_del in smc_lgr_cleanup_early smc_lgr_cleanup_early() meant to delete the link group from the link group list, but it deleted the list head by mistake. This may cause memory corruption since we didn't remove the real link group from the list and later memseted the link group structure. We got a list corruption panic when testing: [ &nbsp;231.277259] list_del corruption. prev-&gt;next should be ffff8881398a8000, but was 0000000000000000 [ &nbsp;231.278222] ------------[ cut here ]------------ [ &nbsp;231.278726] kernel BUG at lib/list_debug.c:53! [ &nbsp;231.279326] invalid opcode: 0000 [#1] SMP NOPTI [ &nbsp;231.279803] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.46+ #435 [ &nbsp;231.280466] Hardware name: Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014 [ &nbsp;231.281248] Workqueue: events smc_link_down_work [ &nbsp;231.281732] RIP: 0010:__list_del_entry_valid+0x70/0x90 [ &nbsp;231.282258] Code: 4c 60 82 e8 7d cc 6a 00 0f 0b 48 89 fe 48 c7 c7 88 4c 60 82 e8 6c cc 6a 00 0f 0b 48 89 fe 48 c7 c7 c0 4c 60 82 e8 5b cc 6a 00 <0f&gt; 0b 48 89 fe 48 c7 c7 00 4d 60 82 e8 4a cc 6a 00 0f 0b cc cc cc [ &nbsp;231.284146] RSP: 0018:ffffc90000033d58 EFLAGS: 00010292 [ &nbsp;231.284685] RAX: 0000000000000054 RBX: ffff8881398a8000 RCX: 0000000000000000 [ &nbsp;231.285415] RDX: 0000000000000001 RSI: ffff88813bc18040 RDI: ffff88813bc18040 [ &nbsp;231.286141] RBP: ffffffff8305ad40 R08: 0000000000000003 R09: 0000000000000001 [ &nbsp;231.286873] R10: ffffffff82803da0 R11: ffffc90000033b90 R12: 0000000000000001 [ &nbsp;231.287606] R13: 0000000000000000 R14: ffff8881398a8000 R15: 0000000000000003 [ &nbsp;231.288337] FS: &nbsp;0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000 [ &nbsp;231.289160] CS: &nbsp;0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ &nbsp;231.289754] CR2: 0000000000e72058 CR3: 000000010fa96006 CR4: 00000000003706f0 [ &nbsp;231.290485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ &nbsp;231.291211] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ &nbsp;231.291940] Call Trace: [ &nbsp;231.292211] &nbsp;smc_lgr_terminate_sched+0x53/0xa0 [ &nbsp;231.292677] &nbsp;smc_switch_conns+0x75/0x6b0 [ &nbsp;231.293085] &nbsp;? update_load_avg+0x1a6/0x590 [ &nbsp;231.293517] &nbsp;? ttwu_do_wakeup+0x17/0x150 [ &nbsp;231.293907] &nbsp;? update_load_avg+0x1a6/0x590 [ &nbsp;231.294317] &nbsp;? newidle_balance+0xca/0x3d0 [ &nbsp;231.294716] &nbsp;smcr_link_down+0x50/0x1a0 [ &nbsp;231.295090] &nbsp;? __wake_up_common_lock+0x77/0x90 [ &nbsp;231.295534] &nbsp;smc_link_down_work+0x46/0x60 [ &nbsp;231.295933] &nbsp;process_one_work+0x18b/0x350 2024年7月10日

影响产品

产品 状态
KY3.4-5 kernel Unaffected
KY3.5.2 kernel Unaffected
KY3.5.3 kernel Unaffected
V6 kernel Unaffected