-

CVE-2023-53338

In the Linux kernel, the following vulnerability has been resolved:

lwt: Fix return values of BPF xmit ops

BPF encap ops can return different types of positive values, such like
NET_RX_DROP, NET_XMIT_CN, NETDEV_TX_BUSY, and so on, from function
skb_do_redirect and bpf_lwt_xmit_reroute. At the xmit hook, such return
values would be treated implicitly as LWTUNNEL_XMIT_CONTINUE in
ip(6)_finish_output2. When this happens, skbs that have been freed would
continue to the neighbor subsystem, causing use-after-free bug and
kernel crashes.

To fix the incorrect behavior, skb_do_redirect return values can be
simply discarded, the same as tc-egress behavior. On the other hand,
bpf_lwt_xmit_reroute returns useful errors to local senders, e.g. PMTU
information. Thus convert its return values to avoid the conflict with
LWTUNNEL_XMIT_CONTINUE.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 67f8f2bae8e7ac72e09def2b667e44704c4d1ee1
Version 3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status affected
Version < a97f221651fcdc891166e9bc270e3d9bfa5a0080
Version 3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status affected
Version < e3f647e4b642f9f6d32795a16f92c116c138d2af
Version 3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status affected
Version < 065d5f17096ec9161180e2c890afdff4dc6125f2
Version 3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status affected
Version < d68c17402442f5f494a2c3ebde5cb82f6aa9160a
Version 3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status affected
Version < 65583f9e070db7bece20710cfa2e3daeb0b831d9
Version 3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status affected
Version < 29b22badb7a84b783e3a4fffca16f7768fb31205
Version 3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.10
Status affected
Version < 4.10
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.53
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string