| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndccp: fix dccp_v4_err()/dccp_v6_err() again\n\ndh->dccph_x is the 9th byte (offset 8) in \"struct dccp_hdr\",\nnot in the \"byte 7\" as Jann claimed.\n\nWe need to make sure the ICMP messages are big enough,\nusing more standard ways (no more assumptions).\n\nsyzbot reported:\nBUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2667 [inline]\nBUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2681 [inline]\nBUG: KMSAN: uninit-value in dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94\npskb_may_pull_reason include/linux/skbuff.h:2667 [inline]\npskb_may_pull include/linux/skbuff.h:2681 [inline]\ndccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94\nicmpv6_notify+0x4c7/0x880 net/ipv6/icmp.c:867\nicmpv6_rcv+0x19d5/0x30d0\nip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438\nip6_input_finish net/ipv6/ip6_input.c:483 [inline]\nNF_HOOK include/linux/netfilter.h:304 [inline]\nip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\nip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\ndst_input include/net/dst.h:468 [inline]\nip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79\nNF_HOOK include/linux/netfilter.h:304 [inline]\nipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310\n__netif_receive_skb_one_core net/core/dev.c:5523 [inline]\n__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637\nnetif_receive_skb_internal net/core/dev.c:5723 [inline]\nnetif_receive_skb+0x58/0x660 net/core/dev.c:5782\ntun_rx_batched+0x83b/0x920\ntun_get_user+0x564c/0x6940 drivers/net/tun.c:2002\ntun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\ncall_write_iter include/linux/fs.h:1985 [inline]\nnew_sync_write fs/read_write.c:491 [inline]\nvfs_write+0x8ef/0x15c0 fs/read_write.c:584\nksys_write+0x20f/0x4c0 fs/read_write.c:637\n__do_sys_write fs/read_write.c:649 [inline]\n__se_sys_write fs/read_write.c:646 [inline]\n__x64_sys_write+0x93/0xd0 fs/read_write.c:646\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\nslab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767\nslab_alloc_node mm/slub.c:3478 [inline]\nkmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523\nkmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559\n__alloc_skb+0x318/0x740 net/core/skbuff.c:650\nalloc_skb include/linux/skbuff.h:1286 [inline]\nalloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6313\nsock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2795\ntun_alloc_skb drivers/net/tun.c:1531 [inline]\ntun_get_user+0x23cf/0x6940 drivers/net/tun.c:1846\ntun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\ncall_write_iter include/linux/fs.h:1985 [inline]\nnew_sync_write fs/read_write.c:491 [inline]\nvfs_write+0x8ef/0x15c0 fs/read_write.c:584\nksys_write+0x20f/0x4c0 fs/read_write.c:637\n__do_sys_write fs/read_write.c:649 [inline]\n__se_sys_write fs/read_write.c:646 [inline]\n__x64_sys_write+0x93/0xd0 fs/read_write.c:646\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nCPU: 0 PID: 4995 Comm: syz-executor153 Not tainted 6.6.0-rc1-syzkaller-00014-ga747acc0b752 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023" |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "net/dccp/ipv4.c", |
| "net/dccp/ipv6.c" |
| ], |
| "versions": [ |
| { |
| "version": "3533e10272555c422a7d51ebc0ce8c483429f7f2", |
| "lessThan": "4600beae416d754a3cedbb1ecea8181ec05073b6", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "177212bf6dc1ff2d13d0409cddc5c9e81feec63d", |
| "lessThan": "62c218124fe58372e0e1f60d5b634d21c264b337", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "7a7dd70cb954d3efa706a429687ded88c02496fa", |
| "lessThan": "a6f4d582e25d512c9b492670b6608436694357b3", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "4b8a938e329ae4eb54b73b0c87b5170607b038a8", |
| "lessThan": "60d73c62e3e4464f375758b6f2459c13d46465b6", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "6ecf09699eb1554299aa1e7fd13e9e80f656c2f9", |
| "lessThan": "26df9ab5de308caa1503d937533c56c35793018d", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "f8a7f10a1dccf9868ff09342a73dce27501b86df", |
| "lessThan": "73be49248a04746096339a48a33fa2f03bd85969", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "ec620c34f5fa5d055f9f6136a387755db6157712", |
| "lessThan": "1512d8f45d3c5d0b5baa00bd8e600492fa569f40", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "977ad86c2a1bcaf58f01ab98df5cc145083c489c", |
| "lessThan": "6af289746a636f71f4c0535a9801774118486c7a", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "d8171411a661253e6271fa10b65b46daf1b6471c", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "net/dccp/ipv4.c", |
| "net/dccp/ipv6.c" |
| ], |
| "versions": [ |
| { |
| "version": "4.14.326", |
| "lessThan": "4.14.327", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.19.295", |
| "lessThan": "4.19.296", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.257", |
| "lessThan": "5.4.258", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.195", |
| "lessThan": "5.10.198", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.132", |
| "lessThan": "5.15.134", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.53", |
| "lessThan": "6.1.56", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.5.3", |
| "lessThan": "6.5.6", |
| "status": "affected", |
| "versionType": "semver" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.14.326", |
| "versionEndExcluding": "4.14.327" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.19.295", |
| "versionEndExcluding": "4.19.296" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.4.257", |
| "versionEndExcluding": "5.4.258" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.10.195", |
| "versionEndExcluding": "5.10.198" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.15.132", |
| "versionEndExcluding": "5.15.134" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.1.53", |
| "versionEndExcluding": "6.1.56" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.5.3", |
| "versionEndExcluding": "6.5.6" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.4.16" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018d" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7a" |
| } |
| ], |
| "title": "dccp: fix dccp_v4_err()/dccp_v6_err() again", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2023-52577", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |