• CVE-2023-1077

发布时间: 2023年3月9日

修改时间: 2024年11月30日

概要

pick_next_rt_entity() may return a type confused entry, notdetected by the BUG_ON condition, as the confused entry will not beNULL, but list_head.The buggy error condition would lead to a type confused entry with thelist head, which would then be used as a type confusedsched_rt_entity, causing memory corruption.It is hard to trigger it, because found it with static analysis and were not able to trigger it manually. But pick_next_rt_entity() may return a type confused entry, the BUG_ON will never trigger since it assumes the error condition is NULL, while the buggy error condition would be a type confused entry with the list head, which would then be used as a type confused sched_rt_entity.Reference:https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Local Local
CVSS评分 7.0 7.0
Attack Complexity High High
Privileges Required Low Low
Scope Unchanged Unchanged
Integrity High High
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-1165 pick_next_rt_entity() may return a type confused entry, notdetected by the BUG_ON condition, as the confused entry will not beNULL, but list_head.The buggy error condition would lead to a type confused entry with thelist head, which would then be used as a type confusedsched_rt_entity, causing memory corruption.It is hard to trigger it, because found it with static analysis and were not able to trigger it manually. But pick_next_rt_entity() may return a type confused entry, the BUG_ON will never trigger since it assumes the error condition is NULL, while the buggy error condition would be a type confused entry with the list head, which would then be used as a type confused sched_rt_entity.Reference:https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97 2023年3月9日

影响产品

产品 状态
KY3.4-4A kernel Unaffected
KY3.4-5 kernel Unaffected
KY3.5.1 kernel Unaffected
KY3.5.2 kernel Unaffected