漏洞标题
bpf、arm64:修复启用基于标签的KASAN时地址发射问题
漏洞描述信息
在Linux内核中,已解决了以下漏洞:
bpf, arm64: 修复启用了基于标签的KASAN时的地址生成问题
当启用BPF_TRAMP_F_CALL_ORIG时,在计算大小的阶段会将堆栈上的bpf_tramp_image结构的地址传递,而在代码生成阶段则会传递堆上的地址。如果启用了基于标签的KASAN,并且堆地址被标记,emit_a64_mov_i64()会生成比计算大小阶段更长的代码,从而可能导致堆缓冲区溢出。即使没有启用基于标签的KASAN,如果在计算大小阶段堆栈地址的16位字节恰好为全1,也会出现同样的问题。通过在计算bpf_tramp_image地址生成大小时假设最坏情况(4条指令)来修复该问题。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞类别
跨界内存写
漏洞标题
bpf, arm64: Fix address emission with tag-based KASAN enabled
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved:
bpf, arm64: Fix address emission with tag-based KASAN enabled
When BPF_TRAMP_F_CALL_ORIG is enabled, the address of a bpf_tramp_image
struct on the stack is passed during the size calculation pass and
an address on the heap is passed during code generation. This may
cause a heap buffer overflow if the heap address is tagged because
emit_a64_mov_i64() will emit longer code than it did during the size
calculation pass. The same problem could occur without tag-based
KASAN if one of the 16-bit words of the stack address happened to
be all-ones during the size calculation pass. Fix the problem by
assuming the worst case (4 instructions) when calculating the size
of the bpf_tramp_image address emission.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Linux kernel 安全漏洞
漏洞描述信息
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于存在基于标签的KASAN启用时地址发射问题。
CVSS信息
N/A
漏洞类别
其他