目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2022-48853— Linux kernel 安全漏洞

EPSS 0.02% · P5
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2022-48853 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: swiotlb: fix info leak with DMA_FROM_DEVICE The problem I'm addressing was discovered by the LTP test covering cve-2018-1000204. A short description of what happens follows: 1) The test case issues a command code 00 (TEST UNIT READY) via the SG_IO interface with: dxfer_len == 524288, dxdfer_dir == SG_DXFER_FROM_DEV and a corresponding dxferp. The peculiar thing about this is that TUR is not reading from the device. 2) In sg_start_req() the invocation of blk_rq_map_user() effectively bounces the user-space buffer. As if the device was to transfer into it. Since commit a45b599ad808 ("scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()") we make sure this first bounce buffer is allocated with GFP_ZERO. 3) For the rest of the story we keep ignoring that we have a TUR, so the device won't touch the buffer we prepare as if the we had a DMA_FROM_DEVICE type of situation. My setup uses a virtio-scsi device and the buffer allocated by SG is mapped by the function virtqueue_add_split() which uses DMA_FROM_DEVICE for the "in" sgs (here scatter-gather and not scsi generics). This mapping involves bouncing via the swiotlb (we need swiotlb to do virtio in protected guest like s390 Secure Execution, or AMD SEV). 4) When the SCSI TUR is done, we first copy back the content of the second (that is swiotlb) bounce buffer (which most likely contains some previous IO data), to the first bounce buffer, which contains all zeros. Then we copy back the content of the first bounce buffer to the user-space buffer. 5) The test case detects that the buffer, which it zero-initialized, ain't all zeros and fails. One can argue that this is an swiotlb problem, because without swiotlb we leak all zeros, and the swiotlb should be transparent in a sense that it does not affect the outcome (if all other participants are well behaved). Copying the content of the original buffer into the swiotlb buffer is the only way I can think of to make swiotlb transparent in such scenarios. So let's do just that if in doubt, but allow the driver to tell us that the whole mapped buffer is going to be overwritten, in which case we can preserve the old behavior and avoid the performance impact of the extra bounce.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于swiotlb模块中发现信息泄露问题。在使用DMA_FROM_DEVICE时,可能会泄露设备的数据。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 ~ fd97de9c7b973f46a6103f4170c5efc7b8ef8797 -
LinuxLinux 2.6.12 -

二、漏洞 CVE-2022-48853 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2022-48853 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2024-07-16 · 共 98 条

CVE-2022-48831Linux kernel 安全漏洞
CVE-2022-48825Linux kernel 安全漏洞
CVE-2022-48821Linux kernel 安全漏洞
CVE-2022-48819Linux kernel 安全漏洞
CVE-2022-48820Linux kernel 安全漏洞
CVE-2022-48818Linux kernel 安全漏洞
CVE-2022-48817Linux kernel 安全漏洞
CVE-2022-48822Linux kernel 安全漏洞
CVE-2022-48828Linux kernel 安全漏洞
CVE-2022-48830Linux kernel 安全漏洞
CVE-2022-48829Linux kernel 安全漏洞
CVE-2022-48832Linux kernel 安全漏洞
CVE-2022-48834Linux kernel 安全漏洞
CVE-2022-48833Linux kernel 安全漏洞
CVE-2022-48835Linux kernel 安全漏洞
CVE-2022-48837Linux kernel 安全漏洞
CVE-2022-48836Linux kernel 安全漏洞
CVE-2022-48838Linux kernel 安全漏洞
CVE-2022-48839Linux kernel 安全漏洞
CVE-2022-48840Linux kernel 安全漏洞

显示前 20 条,共 98 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-48853

暂无评论


发表评论