cve-2023-52843
Vulnerability from cvelistv5
Published
2024-05-21 15:31
Modified
2024-11-04 14:53
Severity ?
Summary
llc: verify mac len before reading mac header
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79
Impacted products
Vendor Product Version
Linux Linux Version: 2.6.25
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52843",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-17T18:03:39.566045Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-17T18:04:29.081Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:11:36.182Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/llc/llc_input.c",
            "net/llc/llc_s_ac.c",
            "net/llc/llc_station.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "900a4418e3f6",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            },
            {
              "lessThan": "9a3f9054a522",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            },
            {
              "lessThan": "cbdcdf42d15d",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            },
            {
              "lessThan": "3a2653828ffc",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            },
            {
              "lessThan": "352887b3edd0",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            },
            {
              "lessThan": "f980e9a57dfb",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            },
            {
              "lessThan": "0a720d0259ad",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            },
            {
              "lessThan": "ff5cb6a4f0c6",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            },
            {
              "lessThan": "7b3ba18703a6",
              "status": "affected",
              "version": "f83f1768f833",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/llc/llc_input.c",
            "net/llc/llc_s_ac.c",
            "net/llc/llc_station.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.25"
            },
            {
              "lessThan": "2.6.25",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.330",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.299",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.261",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.201",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.139",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.63",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.12",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.7",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: verify mac len before reading mac header\n\nLLC reads the mac header with eth_hdr without verifying that the skb\nhas an Ethernet header.\n\nSyzbot was able to enter llc_rcv on a tun device. Tun can insert\npackets without mac len and with user configurable skb-\u003eprotocol\n(passing a tun_pi header when not configuring IFF_NO_PI).\n\n    BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]\n    BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111\n    llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]\n    llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111\n    llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218\n    __netif_receive_skb_one_core net/core/dev.c:5523 [inline]\n    __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637\n    netif_receive_skb_internal net/core/dev.c:5723 [inline]\n    netif_receive_skb+0x58/0x660 net/core/dev.c:5782\n    tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n    tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002\n\nAdd a mac_len test before all three eth_hdr(skb) calls under net/llc.\n\nThere are further uses in include/net/llc_pdu.h. All these are\nprotected by a test skb-\u003eprotocol == ETH_P_802_2. Which does not\nprotect against this tun scenario.\n\nBut the mac_len test added in this patch in llc_fixup_skb will\nindirectly protect those too. That is called from llc_rcv before any\nother LLC code.\n\nIt is tempting to just add a blanket mac_len check in llc_rcv, but\nnot sure whether that could break valid LLC paths that do not assume\nan Ethernet header. 802.2 LLC may be used on top of non-802.3\nprotocols in principle. The below referenced commit shows that used\nto, on top of Token Ring.\n\nAt least one of the three eth_hdr uses goes back to before the start\nof git history. But the one that syzbot exercises is introduced in\nthis commit. That commit is old enough (2008), that effectively all\nstable kernels should receive this."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T14:53:42.228Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535"
        },
        {
          "url": "https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c"
        },
        {
          "url": "https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f"
        },
        {
          "url": "https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779"
        },
        {
          "url": "https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b"
        },
        {
          "url": "https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29"
        },
        {
          "url": "https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a"
        },
        {
          "url": "https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79"
        },
        {
          "url": "https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b"
        }
      ],
      "title": "llc: verify mac len before reading mac header",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52843",
    "datePublished": "2024-05-21T15:31:41.872Z",
    "dateReserved": "2024-05-21T15:19:24.254Z",
    "dateUpdated": "2024-11-04T14:53:42.228Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-52843\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-21T16:15:21.583\",\"lastModified\":\"2024-11-21T08:40:42.263\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nllc: verify mac len before reading mac header\\n\\nLLC reads the mac header with eth_hdr without verifying that the skb\\nhas an Ethernet header.\\n\\nSyzbot was able to enter llc_rcv on a tun device. Tun can insert\\npackets without mac len and with user configurable skb-\u003eprotocol\\n(passing a tun_pi header when not configuring IFF_NO_PI).\\n\\n    BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]\\n    BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111\\n    llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]\\n    llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111\\n    llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218\\n    __netif_receive_skb_one_core net/core/dev.c:5523 [inline]\\n    __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637\\n    netif_receive_skb_internal net/core/dev.c:5723 [inline]\\n    netif_receive_skb+0x58/0x660 net/core/dev.c:5782\\n    tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\\n    tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002\\n\\nAdd a mac_len test before all three eth_hdr(skb) calls under net/llc.\\n\\nThere are further uses in include/net/llc_pdu.h. All these are\\nprotected by a test skb-\u003eprotocol == ETH_P_802_2. Which does not\\nprotect against this tun scenario.\\n\\nBut the mac_len test added in this patch in llc_fixup_skb will\\nindirectly protect those too. That is called from llc_rcv before any\\nother LLC code.\\n\\nIt is tempting to just add a blanket mac_len check in llc_rcv, but\\nnot sure whether that could break valid LLC paths that do not assume\\nan Ethernet header. 802.2 LLC may be used on top of non-802.3\\nprotocols in principle. The below referenced commit shows that used\\nto, on top of Token Ring.\\n\\nAt least one of the three eth_hdr uses goes back to before the start\\nof git history. But the one that syzbot exercises is introduced in\\nthis commit. That commit is old enough (2008), that effectively all\\nstable kernels should receive this.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: llc: verificar mac len antes de leer el encabezado de mac. LLC lee el encabezado de mac con eth_hdr sin verificar que el skb tenga un encabezado de Ethernet. Syzbot pudo ingresar llc_rcv en un dispositivo tun. Tun puede insertar paquetes sin mac len y con el protocolo skb-\u0026gt; configurable por el usuario (pasando un encabezado tun_pi cuando no se configura IFF_NO_PI). ERROR: KMSAN: valor uninit en llc_station_ac_send_test_r net/llc/llc_station.c:81 [en l\u00ednea] BUG: KMSAN: valor uninit en llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111 llc_station_ac_send_test_r net/llc/llc_station. c:81 [en l\u00ednea] llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111 llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218 __netif_receive_skb_one_core net/core/dev.c:5523 __netif_receive_skb+ 0x1a6 /0x5a0 net/core/dev.c:5637 netif_receive_skb_internal net/core/dev.c:5723 [en l\u00ednea] netif_receive_skb+0x58/0x660 net/core/dev.c:5782 tun_rx_batched+0x3ee/0x980 drivers/net/tun.c :1555 tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002 Agregue una prueba mac_len antes de las tres llamadas eth_hdr(skb) en net/llc. Hay m\u00e1s usos en include/net/llc_pdu.h. Todos estos est\u00e1n protegidos por un protocolo de prueba skb-\u0026gt;== ETH_P_802_2. Lo cual no protege contra este escenario tun. Pero la prueba mac_len agregada en este parche en llc_fixup_skb tambi\u00e9n los proteger\u00e1 indirectamente. Esto se llama desde llc_rcv antes que cualquier otro c\u00f3digo LLC. Es tentador simplemente agregar una verificaci\u00f3n general de mac_len en llc_rcv, pero no estoy seguro de si eso podr\u00eda interrumpir las rutas LLC v\u00e1lidas que no asumen un encabezado Ethernet. En principio, 802.2 LLC se puede utilizar adem\u00e1s de protocolos que no sean 802.3. La confirmaci\u00f3n a la que se hace referencia a continuaci\u00f3n muestra que sol\u00eda hacerlo, adem\u00e1s de Token Ring. Al menos uno de los tres usos de eth_hdr se remonta a antes del inicio del historial de git. Pero el que ejercita syzbot se introduce en este compromiso. Ese compromiso es lo suficientemente antiguo (2008), por lo que efectivamente todos los n\u00facleos estables deber\u00edan recibirlo.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.