摘要:
pick_next_rt_entity() may return a type confused entry, notdetected by the BUG_ON condition, as the confused entry will not beNULL, but list_head.The buggy error condition would lead to a type confused entry with thelist head, which would then be used as a type confusedsched_rt_entity, causing memory corruption.It is hard to trigger it, because found it with static analysis and were not able to trigger it manually. But pick_next_rt_entity() may return a type confused entry, the BUG_ON will never trigger since it assumes the error condition is NULL, while the buggy error condition would be a type confused entry with the list head, which would then be used as a type confused sched_rt_entity.Reference:https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
安全等级: Low
公告ID: KylinSec-SA-2023-1165
发布日期: 2023年3月9日
关联CVE: CVE-2023-1077
pick_next_rt_entity() may return a type confused entry, notdetected by the BUG_ON condition, as the confused entry will not beNULL, but list_head.The buggy error condition would lead to a type confused entry with thelist head, which would then be used as a type confusedsched_rt_entity, causing memory corruption.It is hard to trigger it, because found it with static analysis and were not able to trigger it manually. But pick_next_rt_entity() may return a type confused entry, the BUG_ON will never trigger since it assumes the error condition is NULL, while the buggy error condition would be a type confused entry with the list head, which would then be used as a type confused sched_rt_entity.Reference:https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-1077 | KY3.4-4A | kernel | Unaffected |
CVE-2023-1077 | KY3.4-5 | kernel | Unaffected |
CVE-2023-1077 | KY3.5.1 | kernel | Unaffected |