Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-27365: git/torvalds/linux.git - Linux kernel source tree

An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.

CVE
#linux#git#oracle

author

Chris Leech [email protected]

2021-02-23 21:39:01 -0800

committer

Martin K. Petersen [email protected]

2021-03-04 20:09:51 -0500

commit

f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5 (patch)

tree

780979f5262e57682093d004e22fffff407469c7

parent

ec98ea7070e94cc25a422ec97d1421e28d97b7ee (diff)

download

linux-f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5.tar.gz

scsi: iscsi: Verify lengths on passthrough PDUs

Open-iSCSI sends passthrough PDUs over netlink, but the kernel should be verifying that the provided PDU header and data lengths fall within the netlink message to prevent accessing beyond that in memory. Cc: [email protected] Reported-by: Adam Nichols [email protected] Reviewed-by: Lee Duncan [email protected] Reviewed-by: Mike Christie [email protected] Signed-off-by: Chris Leech [email protected] Signed-off-by: Martin K. Petersen [email protected]

-rw-r–r--

drivers/scsi/scsi_transport_iscsi.c

9

1 files changed, 9 insertions, 0 deletions

diff --git a/drivers/scsi/scsi_transport_iscsi.c b/drivers/scsi/scsi_transport_iscsi.c
index c1eff85a8976c…91074fd97f644 100644
— a/drivers/scsi/scsi_transport_iscsi.c
+++ b/drivers/scsi/scsi_transport_iscsi.c

@@ -3624,6 +3624,7 @@ iscsi_if_recv_msg(struct sk_buff *skb, struct nlmsghdr *nlh, uint32_t *group)

{

int err = 0;

u32 portid;

+ u32 pdu_len;

struct iscsi_uevent *ev = nlmsg_data(nlh);

struct iscsi_transport *transport = NULL;

struct iscsi_internal *priv;

@@ -3766,6 +3767,14 @@ iscsi_if_recv_msg(struct sk_buff *skb, struct nlmsghdr *nlh, uint32_t *group)

err = -EINVAL;

break;

case ISCSI_UEVENT_SEND_PDU:

+ pdu_len = nlh->nlmsg_len - sizeof(*nlh) - sizeof(*ev);

+ if ((ev->u.send_pdu.hdr_size > pdu_len) ||

+ (ev->u.send_pdu.data_size > (pdu_len - ev->u.send_pdu.hdr_size))) {

+ err = -EINVAL;

+ break;

+ }

conn = iscsi_conn_lookup(ev->u.send_pdu.sid, ev->u.send_pdu.cid);

if (conn) {

mutex_lock(&conn_mutex);

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907