Linux Distros 未修补的漏洞:CVE-2026-43413

medium Nessus 插件 ID 313310

简介

Linux/Unix 主机上安装的一个或多个程序包存在漏洞,但供应商表示不会修补此漏洞。

描述

Linux/Unix 主机中安装的一个或多个程序包受到一个漏洞影响,而供应商没有提供补丁程序。

- scsi:hisi_sas:修复 user_scan() 期间的空指针异常 user_scan() 为通道 0 调用更新后的 sas_user_scan(),如果成功,则通过提交 37c4e72b0651 中的 scsi_scan_host_selected() 迭代扫描剩余通道(1 到 shost->max_channel)(scsi:修复 sas_user_scan() 以处理通配符和多通道扫描)。但是,hisi_sas只支持一个通道,max_channel的当前值为1。
通道 1 的 sas_user_scan() 将触发以下空指针异常:[ 441.554662] 无法处理虚拟地址 000000000000008b0 上的内核空指针取消引用 [ 441.554699] 内存中止信息:[441.554710] ESR = 0x0000000096000004 [ 441.554718] EC = 0x25:DABT(当前 EL),IL = 32 位 [441.554723] SET = 0,FnV = 0 [ 441.554726] EA = 0,S1PTW = 0 [ 441.554730] FSC = 0x04:0 级转换错误 [ 441.554735] 数据中止信息:[ 441.554737] ISV = 0, ISS = 0x00000004,ISS2 = 0x00000000 [441.554742] CM = 0,WnR = 0,TnD = 0,TagAccess = 0 [ 441.554747] GCS = 0,Overlay = 0,DirtyBit = 0,Xs = 0 [ 441.554752] 用户可分页:4k 页面,48 位 VA, pgdp=00000828377a6000 [ 441.554757] [000000000000008b0] pgd=0000000000000000,p4d=0000000000000000 [ 441.554769] 内部错误:错误:0000000096000004 [#1] SMP [441.629589] 链接中的模块:arm_spe_pmu arm_smmuv3_pmu tpm_tis_spi hisi_uncore_sllc_pmu hisi_uncore_pa_pmu hisi_uncore_l3c_pmu hisi_uncore_hha_pmu hisi_uncore_ddrc_pmu hisi_uncore_cpa_pmu hns3_pmuhisi_ptt hisi_pcie_pmu tpm_tis_core spidev spi_hisi_sfc_v3xx hisi_uncore_pmu spi_dw_mmio fuse hclge hclge_common hisi_sec2 hisi_hpre hisi_zip hisi_qm hns3 hisi_sas_v3_hw sm3_ce sbsa_gwdt hnae3 hisi_sas_main uacce hisi_dma i2c_hisi dm_mirror dm_region_hash dm_log dm_mod [ 441.670819] CPU: 46 UID: 0 PID: 6994 Comm: bash Kdump: 已加载 未受感染 7.0.0-rc2+ #84 PREEMPT [ 441.691327] pstate: 81400009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 441.698277] pc: sas_find_dev_by_rphy+0x44/0x118 [ 441.702896] lr: sas_find_dev_by_rphy+0x3c/0x118 [ 441.707502] sp: ffff80009abbba40 [ 441.710805] x29:
ffff80009abbba40 x28: ffff082819a40008 x27: ffff082810c37c08 [ 441.717930] x26: ffff082810c37c28 x25:
ffff082819a40290 x24: ffff082810c37c00 [ 441.725054] x23: 0000000000000000 x22: 0000000000000001 x21:
ffff082819a40000 [ 441.732179] x20: ffff082819a40290 x19: 000000000000000 x18: 0000000000000020 [441.739304] x17: 000000000000000 x16: ffffb5dad6bda690 x15: 00000000ffffffffff [ 441.746428] x14:
ffff082814c3b26c x13: 00000000ffffffff x12: ffff082814c3b26a [ 441.753553] x11: 0000000000000000c0 x10:
000000000000003a x9: ffffb5dad5ea94f4 [ 441.760678] x8: 000000000000003a x7: ffff80009abbbab0 x6:
0000000000000030 [ 441.767802] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 [441.774926] x2 : ffff08280f35a300 x1 : ffffb5dad7127180 x0 : 0000000000000000 [ 441.782053] 调用跟踪: [441.784488] sas_find_dev_by_rphy +0x44/0x118 (P) [ 441.789095] sas_target_alloc+0x24/0xb0 [ 441.792920] scsi_alloc_target+0x290/0x330 [ 441.797010] __scsi_scan_target+0x88/0x258 [ 441.801096] scsi_scan_channel+0x74/0xb8 [ 441.805008] scsi_scan_host_selected+0x170/0x188 [ 441.809615] sas_user_scan+0xfc/0x148 [ 441.813267] store_scan+0x10c/0x180 [ 441.816743] dev_attr_store+0x20/0x40 [441.820398] sysfs_kf_write+0x84/0xa8 [ 441.824054] kernfs_fop_write_iter+0x130/0x1c8 [ 441.828487] vfs_write+0x2c0/0x370 [ 441.831880] ksys_write+0x74/0x118 [ 441.835271] __arm64_sys_write+0x24/0x38 [441.839182] invoke_syscall+0x50/0x120 [ 441.842919] el0_svc_common.constprop.0+0xc8/0xf0 [ 441.847611] do_el0_svc+0x24/0x38 [ 441.850913] el0_svc+0x38/0x158 [ 441.854043] el0t_64_sync_handler+0xa0/0xe8 [441.858214] el0t_64_sync+0x1ac/0x1b0 [ 441.861865] 代码: aa1303e0 97ff70a8 34ffff80 d10a4273 (f9445a75) [441.867946] ---[ 结束跟踪 0000000000000000 ]--- 因此 ---truncated--- (CVE-2026-43413)

请注意,Nessus 依赖供应商报告的程序包是否存在进行判断。

解决方案

目前尚未有任何已知的解决方案。

另见

https://security-tracker.debian.org/tracker/CVE-2026-43413

插件详情

严重性: Medium

ID: 313310

文件名: unpatched_CVE_2026_43413.nasl

版本: 1.3

类型: Local

代理: unix

系列: Misc.

发布时间: 2026/5/8

最近更新时间: 2026/5/10

支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 4.4

CVSS v2

风险因素: Low

基本分数: 1.9

时间分数: 1.6

矢量: CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P

CVSS 分数来源: CVE-2026-43413

CVSS v3

风险因素: Medium

基本分数: 5.5

时间分数: 5.1

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

时间矢量: CVSS:3.0/E:U/RL:U/RC:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:linux, cpe:/o:debian:debian_linux:11.0, cpe:/o:debian:debian_linux:12.0

必需的 KB 项: Host/cpu, Host/local_checks_enabled, global_settings/vendor_unpatched, Host/OS/identifier

易利用性: No known exploits are available

漏洞发布日期: 2026/5/8

参考资料信息

CVE: CVE-2026-43413