![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2023-52580 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
net/core: Fix ETH_P_1588 flow dissector When a PTP ethernet raw frame
with a size of more than 256 bytes followed by a 0xff pattern is sent
to __skb_flow_dissect, nhoff value calculation is wrong. For example:
hdr->message_length takes the wrong value (0xffff) and it does not
replicate real header length. In this case, 'nhoff' value was
overridden and the PTP header was badly dissected. This leads to a
kernel crash. net/core: flow_dissector net/core flow dissector nhoff =
0x0000000e net/core flow dissector hdr->message_length = 0x0000ffff
net/core flow dissector nhoff = 0x0001000d (u16 overflow) ... skb
linear: 00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88 skb frag:
00000000: f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff Using the
size of the ptp_header struct will allow the corrected calculation of
the nhoff value. net/core flow dissector nhoff = 0x0000000e net/core
flow dissector nhoff = 0x00000030 (sizeof ptp_header) ... skb linear:
00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88 f7 ff ff skb linear:
00000010: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff skb linear:
00000020: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff skb frag:
00000000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff Kernel
trace: [ 74.984279] ------------[ cut here ]------------ [ 74.989471]
kernel BUG at include/linux/skbuff.h:2440! [ 74.995237] invalid
opcode: 0000 [#1] PREEMPT SMP NOPTI [ 75.001098] CPU: 4 PID: 0 Comm:
swapper/4 Tainted: G U 5.15.85-intel-ese-standard-lts #1 [ 75.011629]
Hardware name: Intel Corporation A-Island (CPU:AlderLake)/A-Island
(ID:06), BIOS SB_ADLP.01.01.00.01.03.008.D-6A9D9E73-dirty Mar 30 2023
[ 75.026507] RIP: 0010:eth_type_trans+0xd0/0x130 [ 75.031594] Code: 03
88 47 78 eb c7 8b 47 68 2b 47 6c 48 8b 97 c0 00 00 00 83 f8 01 7e 1b
48 85 d2 74 06 66 83 3a ff 74 09 b8 00 04 00 00 eb ab <0f> 0b b8 00 01
00 00 eb a2 48 85 ff 74 eb 48 8d 54 24 06 31 f6 b9 [ 75.052612] RSP:
0018:ffff9948c0228de0 EFLAGS: 00010297 [ 75.058473] RAX:
00000000000003f2 RBX: ffff8e47047dc300 RCX: 0000000000001003 [
75.066462] RDX: ffff8e4e8c9ea040 RSI: ffff8e4704e0a000 RDI:
ffff8e47047dc300 [ 75.074458] RBP: ffff8e4704e2acc0 R08:
00000000000003f3 R09: 0000000000000800 [ 75.082466] R10:
000000000000000d R11: ffff9948c0228dec R12: ffff8e4715e4e010 [
75.090461] R13: ffff9948c0545018 R14: 0000000000000001 R15:
0000000000000800 [ 75.098464] FS: 0000000000000000(0000)
GS:ffff8e4e8fb00000(0000) knlGS:0000000000000000 [ 75.107530] CS: 0010
DS: 0000 ES: 0000 CR0: 0000000080050033 [ 75.113982] CR2:
00007f5eb35934a0 CR3: 0000000150e0a002 CR4: 0000000000770ee0 [
75.121980] PKRU: 55555554 [ 75.125035] Call Trace: [ 75.127792] |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-52580 https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40 https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40 https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48 https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48 https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3 https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3 https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9 https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9 |