Rashin lahani a cikin aiwatar da soket na AF_PACKET na Linux kernel

Shekaru uku bayan guguwar raunin rauni (1, 2, 3, 4, 5) a cikin tsarin AF_PACKET na Linux kernel gano matsala daya (CVE-2020-14386), ƙyale mai amfani mara gata na gida don aiwatar da lamba azaman tushen ko fita keɓaɓɓen kwantena idan suna da tushen tushen.

Ƙirƙirar soket na AF_PACKET da cin gajiyar raunin yana buƙatar gata na CAP_NET_RAW. Koyaya, mai amfani mara gata zai iya samun takamaiman izini a cikin kwantena da aka ƙirƙira akan tsarin tare da kunna goyan bayan wuraren suna. Misali, ana kunna wuraren sunan mai amfani ta tsohuwa akan Ubuntu da Fedora, amma ba a kunna su akan Debian da RHEL ba. A kan Android, tsarin watsa labarai na da hakkin ƙirƙirar AF_PACKET soket, ta inda za a iya yin amfani da raunin rauni.

Rashin lahani yana nan a cikin aikin tpacket_rcv kuma yana faruwa ta hanyar kuskure wajen ƙididdige madaidaicin netoff. Mai kai hari zai iya haifar da yanayin da aka rubuta madaidaicin netoff zuwa ƙimar ƙasa da madaidaicin maclen, wanda zai haifar da ambaliya yayin ƙididdige "macoff = netoff - maclen" kuma daga baya kuskuren saita mai nuni zuwa buffer don bayanan mai shigowa. Sakamakon haka, maharin na iya fara rubutawa daga 1 zuwa 10 bytes zuwa wani yanki da ke bayan iyakokin da aka keɓe. An lura cewa amfani yana cikin ci gaba wanda ke ba ku damar samun haƙƙin tushen a cikin tsarin.

Matsalar ta kasance a cikin kwaya tun Yuli 2008, watau. bayyana kanta a cikin dukkan ainihin tsakiya. Gyara yana samuwa a halin yanzu kamar faci. Kuna iya bin diddigin samuwar sabunta fakiti a cikin rabawa akan shafuka masu zuwa: Ubuntu, Fedora, SUSE, Debian, RHEL, Arch.

source: budenet.ru

Add a comment