cve-2023-52572
Vulnerability from cvelistv5
Published
2024-03-02 21:59
Modified
2024-11-04 14:48
Severity ?
Summary
cifs: Fix UAF in cifs_demultiplex_thread()
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52572",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-04T14:36:02.875226Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:23:18.290Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:03:20.848Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/908b3b5e97d25e879de3d1f172a255665491c2c3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/76569e3819e0bb59fc19b1b8688b017e627c268a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d527f51331cace562393a8038d870b3e9916686f"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/smb/client/cifsglob.h",
            "fs/smb/client/transport.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "908b3b5e97d2",
              "status": "affected",
              "version": "ec637e3ffb6b",
              "versionType": "git"
            },
            {
              "lessThan": "76569e3819e0",
              "status": "affected",
              "version": "ec637e3ffb6b",
              "versionType": "git"
            },
            {
              "lessThan": "d527f51331ca",
              "status": "affected",
              "version": "ec637e3ffb6b",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/smb/client/cifsglob.h",
            "fs/smb/client/transport.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.16"
            },
            {
              "lessThan": "2.6.16",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.56",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix UAF in cifs_demultiplex_thread()\n\nThere is a UAF when xfstests on cifs:\n\n  BUG: KASAN: use-after-free in smb2_is_network_name_deleted+0x27/0x160\n  Read of size 4 at addr ffff88810103fc08 by task cifsd/923\n\n  CPU: 1 PID: 923 Comm: cifsd Not tainted 6.1.0-rc4+ #45\n  ...\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x34/0x44\n   print_report+0x171/0x472\n   kasan_report+0xad/0x130\n   kasan_check_range+0x145/0x1a0\n   smb2_is_network_name_deleted+0x27/0x160\n   cifs_demultiplex_thread.cold+0x172/0x5a4\n   kthread+0x165/0x1a0\n   ret_from_fork+0x1f/0x30\n   \u003c/TASK\u003e\n\n  Allocated by task 923:\n   kasan_save_stack+0x1e/0x40\n   kasan_set_track+0x21/0x30\n   __kasan_slab_alloc+0x54/0x60\n   kmem_cache_alloc+0x147/0x320\n   mempool_alloc+0xe1/0x260\n   cifs_small_buf_get+0x24/0x60\n   allocate_buffers+0xa1/0x1c0\n   cifs_demultiplex_thread+0x199/0x10d0\n   kthread+0x165/0x1a0\n   ret_from_fork+0x1f/0x30\n\n  Freed by task 921:\n   kasan_save_stack+0x1e/0x40\n   kasan_set_track+0x21/0x30\n   kasan_save_free_info+0x2a/0x40\n   ____kasan_slab_free+0x143/0x1b0\n   kmem_cache_free+0xe3/0x4d0\n   cifs_small_buf_release+0x29/0x90\n   SMB2_negotiate+0x8b7/0x1c60\n   smb2_negotiate+0x51/0x70\n   cifs_negotiate_protocol+0xf0/0x160\n   cifs_get_smb_ses+0x5fa/0x13c0\n   mount_get_conns+0x7a/0x750\n   cifs_mount+0x103/0xd00\n   cifs_smb3_do_mount+0x1dd/0xcb0\n   smb3_get_tree+0x1d5/0x300\n   vfs_get_tree+0x41/0xf0\n   path_mount+0x9b3/0xdd0\n   __x64_sys_mount+0x190/0x1d0\n   do_syscall_64+0x35/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe UAF is because:\n\n mount(pid: 921)               | cifsd(pid: 923)\n-------------------------------|-------------------------------\n                               | cifs_demultiplex_thread\nSMB2_negotiate                 |\n cifs_send_recv                |\n  compound_send_recv           |\n   smb_send_rqst               |\n    wait_for_response          |\n     wait_event_state      [1] |\n                               |  standard_receive3\n                               |   cifs_handle_standard\n                               |    handle_mid\n                               |     mid-\u003eresp_buf = buf;  [2]\n                               |     dequeue_mid           [3]\n     KILL the process      [4] |\n    resp_iov[i].iov_base = buf |\n free_rsp_buf              [5] |\n                               |   is_network_name_deleted [6]\n                               |   callback\n\n1. After send request to server, wait the response until\n    mid-\u003emid_state != SUBMITTED;\n2. Receive response from server, and set it to mid;\n3. Set the mid state to RECEIVED;\n4. Kill the process, the mid state already RECEIVED, get 0;\n5. Handle and release the negotiate response;\n6. UAF.\n\nIt can be easily reproduce with add some delay in [3] - [6].\n\nOnly sync call has the problem since async call\u0027s callback is\nexecuted in cifsd process.\n\nAdd an extra state to mark the mid state to READY before wakeup the\nwaitter, then it can get the resp safely."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T14:48:59.093Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/908b3b5e97d25e879de3d1f172a255665491c2c3"
        },
        {
          "url": "https://git.kernel.org/stable/c/76569e3819e0bb59fc19b1b8688b017e627c268a"
        },
        {
          "url": "https://git.kernel.org/stable/c/d527f51331cace562393a8038d870b3e9916686f"
        }
      ],
      "title": "cifs: Fix UAF in cifs_demultiplex_thread()",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52572",
    "datePublished": "2024-03-02T21:59:41.980Z",
    "dateReserved": "2024-03-02T21:55:42.567Z",
    "dateUpdated": "2024-11-04T14:48:59.093Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-52572\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-02T22:15:49.300\",\"lastModified\":\"2024-03-04T13:58:23.447\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncifs: Fix UAF in cifs_demultiplex_thread()\\n\\nThere is a UAF when xfstests on cifs:\\n\\n  BUG: KASAN: use-after-free in smb2_is_network_name_deleted+0x27/0x160\\n  Read of size 4 at addr ffff88810103fc08 by task cifsd/923\\n\\n  CPU: 1 PID: 923 Comm: cifsd Not tainted 6.1.0-rc4+ #45\\n  ...\\n  Call Trace:\\n   \u003cTASK\u003e\\n   dump_stack_lvl+0x34/0x44\\n   print_report+0x171/0x472\\n   kasan_report+0xad/0x130\\n   kasan_check_range+0x145/0x1a0\\n   smb2_is_network_name_deleted+0x27/0x160\\n   cifs_demultiplex_thread.cold+0x172/0x5a4\\n   kthread+0x165/0x1a0\\n   ret_from_fork+0x1f/0x30\\n   \u003c/TASK\u003e\\n\\n  Allocated by task 923:\\n   kasan_save_stack+0x1e/0x40\\n   kasan_set_track+0x21/0x30\\n   __kasan_slab_alloc+0x54/0x60\\n   kmem_cache_alloc+0x147/0x320\\n   mempool_alloc+0xe1/0x260\\n   cifs_small_buf_get+0x24/0x60\\n   allocate_buffers+0xa1/0x1c0\\n   cifs_demultiplex_thread+0x199/0x10d0\\n   kthread+0x165/0x1a0\\n   ret_from_fork+0x1f/0x30\\n\\n  Freed by task 921:\\n   kasan_save_stack+0x1e/0x40\\n   kasan_set_track+0x21/0x30\\n   kasan_save_free_info+0x2a/0x40\\n   ____kasan_slab_free+0x143/0x1b0\\n   kmem_cache_free+0xe3/0x4d0\\n   cifs_small_buf_release+0x29/0x90\\n   SMB2_negotiate+0x8b7/0x1c60\\n   smb2_negotiate+0x51/0x70\\n   cifs_negotiate_protocol+0xf0/0x160\\n   cifs_get_smb_ses+0x5fa/0x13c0\\n   mount_get_conns+0x7a/0x750\\n   cifs_mount+0x103/0xd00\\n   cifs_smb3_do_mount+0x1dd/0xcb0\\n   smb3_get_tree+0x1d5/0x300\\n   vfs_get_tree+0x41/0xf0\\n   path_mount+0x9b3/0xdd0\\n   __x64_sys_mount+0x190/0x1d0\\n   do_syscall_64+0x35/0x80\\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\\n\\nThe UAF is because:\\n\\n mount(pid: 921)               | cifsd(pid: 923)\\n-------------------------------|-------------------------------\\n                               | cifs_demultiplex_thread\\nSMB2_negotiate                 |\\n cifs_send_recv                |\\n  compound_send_recv           |\\n   smb_send_rqst               |\\n    wait_for_response          |\\n     wait_event_state      [1] |\\n                               |  standard_receive3\\n                               |   cifs_handle_standard\\n                               |    handle_mid\\n                               |     mid-\u003eresp_buf = buf;  [2]\\n                               |     dequeue_mid           [3]\\n     KILL the process      [4] |\\n    resp_iov[i].iov_base = buf |\\n free_rsp_buf              [5] |\\n                               |   is_network_name_deleted [6]\\n                               |   callback\\n\\n1. After send request to server, wait the response until\\n    mid-\u003emid_state != SUBMITTED;\\n2. Receive response from server, and set it to mid;\\n3. Set the mid state to RECEIVED;\\n4. Kill the process, the mid state already RECEIVED, get 0;\\n5. Handle and release the negotiate response;\\n6. UAF.\\n\\nIt can be easily reproduce with add some delay in [3] - [6].\\n\\nOnly sync call has the problem since async call\u0027s callback is\\nexecuted in cifsd process.\\n\\nAdd an extra state to mark the mid state to READY before wakeup the\\nwaitter, then it can get the resp safely.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: cifs: Reparar UAF en cifs_demultiplex_thread() Hay un UAF cuando xfstests en cifs: ERROR: KASAN: use-after-free en smb2_is_network_name_deleted+0x27/0x160 Lectura de tama\u00f1o 4 en addr ffff888810103fc08 por tarea cifsd/923 cpu: 1 pid: 923 com: cifsd no contaminado 6.1.0-rc4+ #45 ... llamar a la llamada:  dump_stack_lvl+0x34/0x44 print_report+0x171/0x472 kasan_raport+0xad/0x130 kasan_range_range_range_range_range_range_mad/0xad/0xad/0xad/0xad/0xad/0xad/0xad/0xad/0xad/0xad/0xad/0xad/0xy 0x145/0x1a0 smb2_is_network_name_deleted+0x27/0x160 cifs_demultiplex_thread.cold+0x172/0x5a4 kthread+0x165/0x1a0 ret_from_fork+0x1f/0x30  Asignado por la tarea 923: kasan_save_stack+0x1e/ 0x40 kasan_set_track+0x21/0x30 __kasan_slab_alloc+0x54/0x60 kmem_cache_alloc +0x147/0x320 mempool_alloc+0xe1/0x260 cifs_small_buf_get+0x24/0x60 allocate_buffers+0xa1/0x1c0 cifs_demultiplex_thread+0x199/0x10d0 kthread+0x165/0x1a0 ret_from_fork+0x1f/0x30 Liberado por tarea 921: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 kasan_save_free_info +0x2a/0x40 ____kasan_slab_free+0x143/0x1b0 kmem_cache_free+0xe3/0x4d0 cifs_small_buf_release+0x29/0x90 SMB2_negotiate+0x8b7/0x1c60 smb2_negotiate+0x51/0x70 cifs_negotiate_protocol+0xf 0/0x160 cifs_get_smb_ses+0x5fa/0x13c0 mount_get_conns+0x7a/0x750 cifs_mount+0x103/0xd00 cifs_smb3_do_mount +0x1dd/0xcb0 smb3_get_tree+0x1d5/0x300 vfs_get_tree+0x41/0xf0 path_mount+0x9b3/0xdd0 __x64_sys_mount+0x190/0x1d0 do_syscall_64+0x35/0x80 Entry_SYSCALL_64_after_hwframe+0x46/0 xb0 La UAF es porque: mount(pid: 921) | cifsd(pid: 923) -------------------------------|------------ ------------------- | cifs_demultiplex_thread SMB2_negotiate | cifs_send_recv | compuesto_send_recv | smb_send_rqst | esperar_para_respuesta | esperar_event_state [1] | | recepci\u00f3n_est\u00e1ndar3 | cifs_handle_standard | manejar_mid | mid-\u0026gt;resp_buf = buf; [2] | dequeue_mid [3] MATAR el proceso [4] | resp_iov[i].iov_base = buf | free_rsp_buf [5] | | is_network_name_eliminado [6] | devoluci\u00f3n de llamada 1. Despu\u00e9s de enviar la solicitud al servidor, espere la respuesta hasta mid-\u0026gt;mid_state != ENVIADO; 2. Reciba la respuesta del servidor y config\u00farelo en medio; 3. Establezca el estado medio en RECIBIDO; 4. Finalice el proceso, el estado medio ya RECIBIDO, obtenga 0; 5. Manejar y liberar la respuesta de negociaci\u00f3n; 6. UAF. Se puede reproducir f\u00e1cilmente agregando algo de retraso en [3] - [6]. Solo la llamada de sincronizaci\u00f3n tiene el problema ya que la devoluci\u00f3n de llamada de la llamada as\u00edncrona se ejecuta en el proceso cifsd. Agregue un estado adicional para marcar el estado medio como LISTO antes de despertar al camarero, luego podr\u00e1 obtener la respuesta de manera segura.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/76569e3819e0bb59fc19b1b8688b017e627c268a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/908b3b5e97d25e879de3d1f172a255665491c2c3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d527f51331cace562393a8038d870b3e9916686f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.