CVE-2023-52577
Vulnerability from cvelistv5
Published
2024-03-02 21:59
Modified
2024-12-19 08:21
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: dccp: fix dccp_v4_err()/dccp_v6_err() again dh->dccph_x is the 9th byte (offset 8) in "struct dccp_hdr", not in the "byte 7" as Jann claimed. We need to make sure the ICMP messages are big enough, using more standard ways (no more assumptions). syzbot reported: BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2667 [inline] BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2681 [inline] BUG: KMSAN: uninit-value in dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94 pskb_may_pull_reason include/linux/skbuff.h:2667 [inline] pskb_may_pull include/linux/skbuff.h:2681 [inline] dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94 icmpv6_notify+0x4c7/0x880 net/ipv6/icmp.c:867 icmpv6_rcv+0x19d5/0x30d0 ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438 ip6_input_finish net/ipv6/ip6_input.c:483 [inline] NF_HOOK include/linux/netfilter.h:304 [inline] ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492 ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586 dst_input include/net/dst.h:468 [inline] ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79 NF_HOOK include/linux/netfilter.h:304 [inline] ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310 __netif_receive_skb_one_core net/core/dev.c:5523 [inline] __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637 netif_receive_skb_internal net/core/dev.c:5723 [inline] netif_receive_skb+0x58/0x660 net/core/dev.c:5782 tun_rx_batched+0x83b/0x920 tun_get_user+0x564c/0x6940 drivers/net/tun.c:2002 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:1985 [inline] new_sync_write fs/read_write.c:491 [inline] vfs_write+0x8ef/0x15c0 fs/read_write.c:584 ksys_write+0x20f/0x4c0 fs/read_write.c:637 __do_sys_write fs/read_write.c:649 [inline] __se_sys_write fs/read_write.c:646 [inline] __x64_sys_write+0x93/0xd0 fs/read_write.c:646 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Uninit was created at: slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767 slab_alloc_node mm/slub.c:3478 [inline] kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559 __alloc_skb+0x318/0x740 net/core/skbuff.c:650 alloc_skb include/linux/skbuff.h:1286 [inline] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6313 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2795 tun_alloc_skb drivers/net/tun.c:1531 [inline] tun_get_user+0x23cf/0x6940 drivers/net/tun.c:1846 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:1985 [inline] new_sync_write fs/read_write.c:491 [inline] vfs_write+0x8ef/0x15c0 fs/read_write.c:584 ksys_write+0x20f/0x4c0 fs/read_write.c:637 __do_sys_write fs/read_write.c:649 [inline] __se_sys_write fs/read_write.c:646 [inline] __x64_sys_write+0x93/0xd0 fs/read_write.c:646 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd CPU: 0 PID: 4995 Comm: syz-executor153 Not tainted 6.6.0-rc1-syzkaller-00014-ga747acc0b752 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018dPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7aPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018dPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7aPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3Patch
Impacted products
Vendor Product Version
Linux Linux Version: 4.14.326   
Version: 4.19.295   
Version: 5.4.257   
Version: 5.10.195   
Version: 5.15.132   
Version: 6.1.53   
Version: 6.5.3   
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52577",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-26T20:40:23.115267Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-26T20:40:47.293Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:03:21.243Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7a"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/dccp/ipv4.c",
            "net/dccp/ipv6.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4600beae416d754a3cedbb1ecea8181ec05073b6",
              "status": "affected",
              "version": "3533e10272555c422a7d51ebc0ce8c483429f7f2",
              "versionType": "git"
            },
            {
              "lessThan": "62c218124fe58372e0e1f60d5b634d21c264b337",
              "status": "affected",
              "version": "177212bf6dc1ff2d13d0409cddc5c9e81feec63d",
              "versionType": "git"
            },
            {
              "lessThan": "a6f4d582e25d512c9b492670b6608436694357b3",
              "status": "affected",
              "version": "7a7dd70cb954d3efa706a429687ded88c02496fa",
              "versionType": "git"
            },
            {
              "lessThan": "60d73c62e3e4464f375758b6f2459c13d46465b6",
              "status": "affected",
              "version": "4b8a938e329ae4eb54b73b0c87b5170607b038a8",
              "versionType": "git"
            },
            {
              "lessThan": "26df9ab5de308caa1503d937533c56c35793018d",
              "status": "affected",
              "version": "6ecf09699eb1554299aa1e7fd13e9e80f656c2f9",
              "versionType": "git"
            },
            {
              "lessThan": "73be49248a04746096339a48a33fa2f03bd85969",
              "status": "affected",
              "version": "f8a7f10a1dccf9868ff09342a73dce27501b86df",
              "versionType": "git"
            },
            {
              "lessThan": "1512d8f45d3c5d0b5baa00bd8e600492fa569f40",
              "status": "affected",
              "version": "ec620c34f5fa5d055f9f6136a387755db6157712",
              "versionType": "git"
            },
            {
              "lessThan": "6af289746a636f71f4c0535a9801774118486c7a",
              "status": "affected",
              "version": "977ad86c2a1bcaf58f01ab98df5cc145083c489c",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/dccp/ipv4.c",
            "net/dccp/ipv6.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4.14.327",
              "status": "affected",
              "version": "4.14.326",
              "versionType": "semver"
            },
            {
              "lessThan": "4.19.296",
              "status": "affected",
              "version": "4.19.295",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.258",
              "status": "affected",
              "version": "5.4.257",
              "versionType": "semver"
            },
            {
              "lessThan": "5.10.198",
              "status": "affected",
              "version": "5.10.195",
              "versionType": "semver"
            },
            {
              "lessThan": "5.15.134",
              "status": "affected",
              "version": "5.15.132",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.56",
              "status": "affected",
              "version": "6.1.53",
              "versionType": "semver"
            },
            {
              "lessThan": "6.5.6",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndccp: fix dccp_v4_err()/dccp_v6_err() again\n\ndh-\u003edccph_x is the 9th byte (offset 8) in \"struct dccp_hdr\",\nnot in the \"byte 7\" as Jann claimed.\n\nWe need to make sure the ICMP messages are big enough,\nusing more standard ways (no more assumptions).\n\nsyzbot reported:\nBUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2667 [inline]\nBUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2681 [inline]\nBUG: KMSAN: uninit-value in dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94\npskb_may_pull_reason include/linux/skbuff.h:2667 [inline]\npskb_may_pull include/linux/skbuff.h:2681 [inline]\ndccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94\nicmpv6_notify+0x4c7/0x880 net/ipv6/icmp.c:867\nicmpv6_rcv+0x19d5/0x30d0\nip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438\nip6_input_finish net/ipv6/ip6_input.c:483 [inline]\nNF_HOOK include/linux/netfilter.h:304 [inline]\nip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\nip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\ndst_input include/net/dst.h:468 [inline]\nip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79\nNF_HOOK include/linux/netfilter.h:304 [inline]\nipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310\n__netif_receive_skb_one_core net/core/dev.c:5523 [inline]\n__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637\nnetif_receive_skb_internal net/core/dev.c:5723 [inline]\nnetif_receive_skb+0x58/0x660 net/core/dev.c:5782\ntun_rx_batched+0x83b/0x920\ntun_get_user+0x564c/0x6940 drivers/net/tun.c:2002\ntun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\ncall_write_iter include/linux/fs.h:1985 [inline]\nnew_sync_write fs/read_write.c:491 [inline]\nvfs_write+0x8ef/0x15c0 fs/read_write.c:584\nksys_write+0x20f/0x4c0 fs/read_write.c:637\n__do_sys_write fs/read_write.c:649 [inline]\n__se_sys_write fs/read_write.c:646 [inline]\n__x64_sys_write+0x93/0xd0 fs/read_write.c:646\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\nslab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767\nslab_alloc_node mm/slub.c:3478 [inline]\nkmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523\nkmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559\n__alloc_skb+0x318/0x740 net/core/skbuff.c:650\nalloc_skb include/linux/skbuff.h:1286 [inline]\nalloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6313\nsock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2795\ntun_alloc_skb drivers/net/tun.c:1531 [inline]\ntun_get_user+0x23cf/0x6940 drivers/net/tun.c:1846\ntun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\ncall_write_iter include/linux/fs.h:1985 [inline]\nnew_sync_write fs/read_write.c:491 [inline]\nvfs_write+0x8ef/0x15c0 fs/read_write.c:584\nksys_write+0x20f/0x4c0 fs/read_write.c:637\n__do_sys_write fs/read_write.c:649 [inline]\n__se_sys_write fs/read_write.c:646 [inline]\n__x64_sys_write+0x93/0xd0 fs/read_write.c:646\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nCPU: 0 PID: 4995 Comm: syz-executor153 Not tainted 6.6.0-rc1-syzkaller-00014-ga747acc0b752 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T08:21:57.796Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6"
        },
        {
          "url": "https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337"
        },
        {
          "url": "https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3"
        },
        {
          "url": "https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6"
        },
        {
          "url": "https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018d"
        },
        {
          "url": "https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969"
        },
        {
          "url": "https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40"
        },
        {
          "url": "https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7a"
        }
      ],
      "title": "dccp: fix dccp_v4_err()/dccp_v6_err() again",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52577",
    "datePublished": "2024-03-02T21:59:45.279Z",
    "dateReserved": "2024-03-02T21:55:42.568Z",
    "dateUpdated": "2024-12-19T08:21:57.796Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-52577\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-02T22:15:49.537\",\"lastModified\":\"2024-12-11T16:21:49.573\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndccp: fix dccp_v4_err()/dccp_v6_err() again\\n\\ndh-\u003edccph_x is the 9th byte (offset 8) in \\\"struct dccp_hdr\\\",\\nnot in the \\\"byte 7\\\" as Jann claimed.\\n\\nWe need to make sure the ICMP messages are big enough,\\nusing more standard ways (no more assumptions).\\n\\nsyzbot reported:\\nBUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2667 [inline]\\nBUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2681 [inline]\\nBUG: KMSAN: uninit-value in dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94\\npskb_may_pull_reason include/linux/skbuff.h:2667 [inline]\\npskb_may_pull include/linux/skbuff.h:2681 [inline]\\ndccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94\\nicmpv6_notify+0x4c7/0x880 net/ipv6/icmp.c:867\\nicmpv6_rcv+0x19d5/0x30d0\\nip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438\\nip6_input_finish net/ipv6/ip6_input.c:483 [inline]\\nNF_HOOK include/linux/netfilter.h:304 [inline]\\nip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\\nip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\\ndst_input include/net/dst.h:468 [inline]\\nip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79\\nNF_HOOK include/linux/netfilter.h:304 [inline]\\nipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310\\n__netif_receive_skb_one_core net/core/dev.c:5523 [inline]\\n__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637\\nnetif_receive_skb_internal net/core/dev.c:5723 [inline]\\nnetif_receive_skb+0x58/0x660 net/core/dev.c:5782\\ntun_rx_batched+0x83b/0x920\\ntun_get_user+0x564c/0x6940 drivers/net/tun.c:2002\\ntun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\\ncall_write_iter include/linux/fs.h:1985 [inline]\\nnew_sync_write fs/read_write.c:491 [inline]\\nvfs_write+0x8ef/0x15c0 fs/read_write.c:584\\nksys_write+0x20f/0x4c0 fs/read_write.c:637\\n__do_sys_write fs/read_write.c:649 [inline]\\n__se_sys_write fs/read_write.c:646 [inline]\\n__x64_sys_write+0x93/0xd0 fs/read_write.c:646\\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\\n\\nUninit was created at:\\nslab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767\\nslab_alloc_node mm/slub.c:3478 [inline]\\nkmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523\\nkmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559\\n__alloc_skb+0x318/0x740 net/core/skbuff.c:650\\nalloc_skb include/linux/skbuff.h:1286 [inline]\\nalloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6313\\nsock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2795\\ntun_alloc_skb drivers/net/tun.c:1531 [inline]\\ntun_get_user+0x23cf/0x6940 drivers/net/tun.c:1846\\ntun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\\ncall_write_iter include/linux/fs.h:1985 [inline]\\nnew_sync_write fs/read_write.c:491 [inline]\\nvfs_write+0x8ef/0x15c0 fs/read_write.c:584\\nksys_write+0x20f/0x4c0 fs/read_write.c:637\\n__do_sys_write fs/read_write.c:649 [inline]\\n__se_sys_write fs/read_write.c:646 [inline]\\n__x64_sys_write+0x93/0xd0 fs/read_write.c:646\\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\\n\\nCPU: 0 PID: 4995 Comm: syz-executor153 Not tainted 6.6.0-rc1-syzkaller-00014-ga747acc0b752 #0\\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dccp: corrija dccp_v4_err()/dccp_v6_err() nuevamente dh-\u0026gt;dccph_x es el noveno byte (desplazamiento 8) en \\\"struct dccp_hdr\\\", no en el \\\"byte 7\\\" como Jann reclamado. Necesitamos asegurarnos de que los mensajes ICMP sean lo suficientemente grandes, utilizando formas m\u00e1s est\u00e1ndar (sin m\u00e1s suposiciones). syzbot inform\u00f3: ERROR: KMSAN: valor uninit en pskb_may_pull_reason include/linux/skbuff.h:2667 [en l\u00ednea] ERROR: KMSAN: valor uninit en pskb_may_pull include/linux/skbuff.h:2681 [en l\u00ednea] ERROR: KMSAN: uninit -valor en dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94 pskb_may_pull_reason include/linux/skbuff.h:2667 [en l\u00ednea] pskb_may_pull include/linux/skbuff.h:2681 [en l\u00ednea] dccp_v6_err+0x426/0x1aa0 net/ dccp/ipv6.c:94 icmpv6_notify+0x4c7/0x880 net/ipv6/icmp.c:867 icmpv6_rcv+0x19d5/0x30d0 ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438 ip6_input_finish net/ipv6 /ip6_input.c:483 [en l\u00ednea] NF_HOOK include/linux/netfilter.h:304 [en l\u00ednea] ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492 ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586 dst_input include/net/dst .h:468 [en l\u00ednea] ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79 NF_HOOK include/linux/netfilter.h:304 [en l\u00ednea] ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310 __netif_receive_skb_one_core net /core/dev.c:5523 [en l\u00ednea] __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637 netif_receive_skb_internal net/core/dev.c:5723 [en l\u00ednea] netif_receive_skb+0x58/0x660 net/core/dev.c :5782 tun_rx_batched+0x83b/0x920 tun_get_user+0x564c/0x6940 drivers/net/tun.c:2002 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:1985 [en l\u00ednea] new_sync_write fs /read_write.c:491 [en l\u00ednea] vfs_write+0x8ef/0x15c0 fs/read_write.c:584 ksys_write+0x20f/0x4c0 fs/read_write.c:637 __do_sys_write fs/read_write.c:649 [en l\u00ednea] __se_sys_write fs/read_write.c :646 [en l\u00ednea] __x64_sys_write+0x93/0xd0 fs/read_write.c:646 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+ 0x63/0xcd Uninit se cre\u00f3 en: slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767 slab_alloc_node mm/slub.c:3478 [en l\u00ednea] kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4 a0 neto/ core/skbuff.c:559 __alloc_skb+0x318/0x740 net/core/skbuff.c:650 alloc_skb include/linux/skbuff.h:1286 [en l\u00ednea] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6313 sock_alloc_send_pskb+ 0xa80/0xbf0 net/core/sock.c:2795 controladores tun_alloc_skb/net/tun.c:1531 [en l\u00ednea] tun_get_user+0x23cf/0x6940 controladores/net/tun.c:1846 tun_chr_write_iter+0x3af/0x5d0 controladores/net/tun. c:2048 call_write_iter include/linux/fs.h:1985 [en l\u00ednea] new_sync_write fs/read_write.c:491 [en l\u00ednea] vfs_write+0x8ef/0x15c0 fs/read_write.c:584 ksys_write+0x20f/0x4c0 fs/read_write.c: 637 __do_sys_write fs/read_write.c:649 [en l\u00ednea] __se_sys_write fs/read_write.c:646 [en l\u00ednea] __x64_sys_write+0x93/0xd0 fs/read_write.c:646 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd CPU: 0 PID: 4995 Comm: syz-executor153 Not tainted 6.6.0-rc1-syzkaller-00014-ga747acc0b752 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/08/2023\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10.195\",\"versionEndExcluding\":\"5.10.198\",\"matchCriteriaId\":\"473AE17D-E000-42E4-8762-8669D7D816A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.132\",\"versionEndExcluding\":\"5.15.134\",\"matchCriteriaId\":\"F47152A2-8AFC-4C71-981D-980B1763D7DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.53\",\"versionEndExcluding\":\"6.1.56\",\"matchCriteriaId\":\"D8B05106-E093-4EE4-86F3-EE7AD5802CDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.3\",\"versionEndExcluding\":\"6.5.6\",\"matchCriteriaId\":\"073850EA-45D9-42D3-93E5-C527A7732405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D69FD12-238F-4D96-8520-4C77E2B6FB85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67A9EA15-10FD-4821-99DA-139F28267AF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66DC852D-D687-42FE-B337-455473C3ADFB\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.