• CVE-2024-26752

发布时间: 2024年5月11日

修改时间: 2024年6月13日

概要

In the Linux kernel, the following vulnerability has been resolved: l2tp: pass correct message length to ip6_append_data l2tp_ip6_sendmsg needs to avoid accounting for the transport header twice when splicing more data into an already partially-occupied skbuff. To manage this, we check whether the skbuff contains data using skb_queue_empty when deciding how much data to append using ip6_append_data. However, the code which performed the calculation was incorrect: ulen = len + skb_queue_empty(&sk->sk_write_queue) ? transhdrlen : 0; ...due to C operator precedence, this ends up setting ulen to transhdrlen for messages with a non-zero length, which results in corrupted packets on the wire. Add parentheses to correct the calculation in line with the original intent.

CVSS v3 指标

NVD openEuler
CVSS评分 7.5
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity High
Availability None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-1501 kernel security update 2024年5月11日
KylinSec-SA-2024-4777 kernel security update 2024年5月17日

影响产品

产品 状态
KY3.4-4A kernel Fixed
KY3.4-5A kernel Fixed
KY3.5.1 kernel Fixed
KY3.5.2 kernel Fixed
V6 kernel Unaffected