Bug 2267790 (CVE-2023-52527)
| Summary: | CVE-2023-52527 kernel: ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Zack Miele <zmiele> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, sidakwo, sukulkar, tglozar, tyberry, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | kernel 4.14.327, kernel 4.19.296, kernel 5.4.258, kernel 5.10.198, kernel 5.15.135, kernel 6.1.57, kernel 6.5.7, kernel 6.6 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in of the Linux kernel's lt2p component, where the transport header length is erroneously included when appending data to IPv4 and IPv6 packets, specifically in situations where the packet is already partially filled, potentially affecting the stability of network operations.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2024-03-04 21:05:56 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2267815 | ||
The result of automatic check (that is developed by Alexander Larkin) for this CVE-2023-52527 is: SKIP No affected files built, so skip this CVE NO - - unknown (where first YES/NO value means if related sources built). |
In the Linux kernel, the following vulnerability has been resolved: ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() The Linux kernel CVE team has assigned CVE-2023-52527 to this issue. Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52527-a1e8@gregkh/T/#u