Linux Kernel可靠数据报套接字’rds_cmsg_rdma_args()’本地整数溢出漏洞

漏洞起因
边界条件错误
危险等级

 
影响系统
Linux kernel 2.6.37
Linux kernel 2.6.36
Linux kernel 2.6.35
Linux kernel 2.6.35
Linux kernel 2.6.35
Linux kernel 2.6.34
Linux kernel 2.6.34
Linux kernel 2.6.33 .1
Linux kernel 2.6.33
Linux kernel 2.6.32 .9
Linux kernel 2.6.32
Linux kernel 2.6.31 5
Linux kernel 2.6.31 13
Linux kernel 2.6.31 .2
Linux kernel 2.6.31 .11
Linux kernel 2.6.31 -rc7
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.31 -rc6
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.31 -rc3
Linux kernel 2.6.31 -rc1
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.31
Linux kernel 2.6.30 .10
Linux kernel 2.6.30 .1
Linux kernel 2.6.30 -rc6
Linux kernel 2.6.30 -rc5
Linux kernel 2.6.30 -rc3
Linux kernel 2.6.30 -rc2
Linux kernel 2.6.30 -rc1
Linux kernel 2.6.30
Linux kernel 2.6.36-rc8
Linux kernel 2.6.36-rc6
Linux kernel 2.6.36-rc5
Linux kernel 2.6.36-rc4
Linux kernel 2.6.36-rc1
Linux kernel 2.6.35.5
Linux kernel 2.6.35.4
Linux kernel 2.6.35.1
Linux kernel 2.6.35.1
Linux kernel 2.6.35-rc6
Linux kernel 2.6.35-rc5-git5
Linux kernel 2.6.35-rc5
Linux kernel 2.6.35-rc4
Linux kernel 2.6.35-rc1
Linux kernel 2.6.34.3
Linux kernel 2.6.34.2
Linux kernel 2.6.34.1
Linux kernel 2.6.34-rc6
Linux kernel 2.6.34-rc5
Linux kernel 2.6.34-rc4
Linux kernel 2.6.34-rc2-git1
Linux kernel 2.6.34-rc2
Linux kernel 2.6.34-rc1
Linux kernel 2.6.33.7
Linux kernel 2.6.33-rc8
Linux kernel 2.6.33-rc7
Linux kernel 2.6.33-rc7
Linux kernel 2.6.33-rc6-git5
Linux kernel 2.6.33-rc6
Linux kernel 2.6.33-rc5
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.33-rc4
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.33-rc1
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.32.8
Linux kernel 2.6.32.7
Linux kernel 2.6.32.6
Linux kernel 2.6.32.5
Linux kernel 2.6.32.4
Linux kernel 2.6.32.3
Linux kernel 2.6.32.22
Linux kernel 2.6.32.2
Linux kernel 2.6.32.18
Linux kernel 2.6.32.17
Linux kernel 2.6.32.16
Linux kernel 2.6.32.15
Linux kernel 2.6.32.14
Linux kernel 2.6.32.13
Linux kernel 2.6.32.12
Linux kernel 2.6.32.11
Linux kernel 2.6.32.10
Linux kernel 2.6.32.1
Linux kernel 2.6.32-rc8
Linux kernel 2.6.32-rc7
Linux kernel 2.6.32-rc5
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.32-rc4
Linux kernel 2.6.32-rc3
Linux kernel 2.6.32-rc2
Linux kernel 2.6.32-rc1
Linux kernel 2.6.31.6
Linux kernel 2.6.31.4
Linux kernel 2.6.31.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.31-rc9
Linux kernel 2.6.31-rc8
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.31-rc5-git3
Linux kernel 2.6.31-rc4
Linux kernel 2.6.31-rc2
Linux kernel 2.6.31-git11
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.30.5
Linux kernel 2.6.30.4
Linux kernel 2.6.30.3
 
不受影响系统
 
危害
本地攻击者可以利用漏洞使系统崩溃。
 
攻击所需条件
攻击者必须访问Linux。
 
漏洞信息
Linux是一款开放源代码的操作系统。
在rds_cmsg_rdma_args()中,用户提供的args->nr_local值限于小于UINT_MAX。由于不严格的上限检查,总的iov_size计算可溢出,导致过小的sock_kmalloc()分配。使用较高的计数值调用rds_rdma_pages()可破坏堆造成拒绝服务攻击。
 
测试方法
 
厂商解决方案
用户可参考如下供应商提供的安全公告获得补丁信息:
http://marc.info/?l=linux-netdev&m=129001184803080&w=2
 
漏洞提供者
Dan Rosenberg

发表评论?

0 条评论。

发表评论