dma-direct:dma_set_decrypted() 失败导致页面泄漏 (CVE-2024-35939)

admin 2024-05-22 00:16:23 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
dma-direct:dma_set_decrypted() 失败导致页面泄漏 (CVE-2024-35939)

CVE编号

CVE-2024-35939

利用情况

暂无

补丁情况

N/A

披露时间

2024-05-19
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: dma-direct: Leak pages on dma_set_decrypted() failure On TDX it is possible for the untrusted host to cause set_memory_encrypted() or set_memory_decrypted() to fail such that an error is returned and the resulting memory is shared. Callers need to take care to handle these errors to avoid returning decrypted (shared) memory to the page allocator, which could lead to functional or security issues. DMA could free decrypted/shared pages if dma_set_decrypted() fails. This should be a rare case. Just leak the pages in this case instead of freeing them.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/4031b72ca747a1e6e9ae4fa729e765b43363d66a
https://git.kernel.org/stable/c/4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9
https://git.kernel.org/stable/c/b57326c96b7bc7638aa8c44e12afa2defe0c934c
https://git.kernel.org/stable/c/b9fa16949d18e06bdf728a560f5c8af56d2bdcaf
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_12 linux * Up to (excluding) 6.1.90-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0