漏洞标题
9p/net:修正对错误的负读写回复处理不当的问题
漏洞描述信息
## 概述
在Linux内核中,修复了9p/net协议栈中的一个漏洞,该漏洞涉及不当处理恶意的负读写响应。
## 细节
在 `p9_client_write()` 和 `p9_client_read_once()` 中,如果服务器错误地回复成功但带有负的读写计数,则会导致变量 `written` (负值) 和 `rsize` (正值) 之间的比较不正确,因为这两个变量都是有符号的。为此,修复方案将这些变量更改为无符号类型,以避免该问题。
## 影响
修复后,之前会触发空指针引用错误的测试用例现在会失败并返回以下错误信息:
```
9pnet: bogus RWRITE count (4294967295 > 3)
```
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
漏洞类别
跨界内存读
漏洞标题
9p/net: fix improper handling of bogus negative read/write replies
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved:
9p/net: fix improper handling of bogus negative read/write replies
In p9_client_write() and p9_client_read_once(), if the server
incorrectly replies with success but a negative write/read count then we
would consider written (negative) <= rsize (positive) because both
variables were signed.
Make variables unsigned to avoid this problem.
The reproducer linked below now fails with the following error instead
of a null pointer deref:
9pnet: bogus RWRITE count (4294967295 > 3)
CVSS信息
N/A
漏洞类别
N/A