漏洞标题
nvmet:修复nvmet_enable_port中的越界访问问题
漏洞描述信息
## 概述
在Linux内核中,已解决了一个漏洞 nvmet: fix out-of-bounds access in nvmet_enable_port。在尝试启用未配置传输的端口时,`nvmet_enable_port()` 使用 NVMF_TRTYPE_MAX (255) 来查询传输数组,导致越界访问。
## 影响版本
无具体指定版本,但漏洞发生在 commit 200adac75888 所做的更改之后。
## 细节
- 当尝试启用一个未配置传输的端口时,`nvmet_enable_port()` 使用 NVMF_TRTYPE_MAX (255) 来查询传输数组,导致越界访问。
- KASAN 日志示例:
```
[ 106.058694] BUG: KASAN: global-out-of-bounds in nvmet_enable_port+0x42/0x1da
[ 106.058719] Read of size 8 at addr ffffffff89dafa58 by task ln/632
[...]
[ 106.076026] nvmet: transport type 255 not supported
```
## 影响
该漏洞可能导致内核出现越界读取错误,进而可能导致系统不稳定或潜在的安全问题。已通过在继续操作前检查 NVMF_TRTYPE_MAX 来避免该问题。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
漏洞类别
跨界内存读
漏洞标题
nvmet: fix out-of-bounds access in nvmet_enable_port
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix out-of-bounds access in nvmet_enable_port
When trying to enable a port that has no transport configured yet,
nvmet_enable_port() uses NVMF_TRTYPE_MAX (255) to query the transports
array, causing an out-of-bounds access:
[ 106.058694] BUG: KASAN: global-out-of-bounds in nvmet_enable_port+0x42/0x1da
[ 106.058719] Read of size 8 at addr ffffffff89dafa58 by task ln/632
[...]
[ 106.076026] nvmet: transport type 255 not supported
Since commit 200adac75888, NVMF_TRTYPE_MAX is the default state as configured by
nvmet_ports_make().
Avoid this by checking for NVMF_TRTYPE_MAX before proceeding.
CVSS信息
N/A
漏洞类别
N/A