We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-48687

ipv6: sr: fix out-of-bounds read when setting HMAC data.



Description

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix out-of-bounds read when setting HMAC data. The SRv6 layer allows defining HMAC data that can later be used to sign IPv6 Segment Routing Headers. This configuration is realised via netlink through four attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and SEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual length of the SECRET attribute, it is possible to provide invalid combinations (e.g., secret = "", secretlen = 64). This case is not checked in the code and with an appropriately crafted netlink message, an out-of-bounds read of up to 64 bytes (max secret length) can occur past the skb end pointer and into skb_shared_info: Breakpoint 1, seg6_genl_sethmac (skb=<optimized out>, info=<optimized out>) at net/ipv6/seg6.c:208 208 memcpy(hinfo->secret, secret, slen); (gdb) bt #0 seg6_genl_sethmac (skb=<optimized out>, info=<optimized out>) at net/ipv6/seg6.c:208 #1 0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600, extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 <init_net>, family=<optimized out>, family=<optimized out>) at net/netlink/genetlink.c:731 #2 0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00, family=0xffffffff82fef6c0 <seg6_genl_family>) at net/netlink/genetlink.c:775 #3 genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792 #4 0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 <genl_rcv_msg>) at net/netlink/af_netlink.c:2501 #5 0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803 #6 0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000) at net/netlink/af_netlink.c:1319 #7 netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=<optimized out>) at net/netlink/af_netlink.c:1345 #8 0xffffffff81dff9a4 in netlink_sendmsg (sock=<optimized out>, msg=0xffffc90000ba7e48, len=<optimized out>) at net/netlink/af_netlink.c:1921 ... (gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)->head + ((struct sk_buff *)0xffff88800b1f9f00)->end $1 = 0xffff88800b1b76c0 (gdb) p/x secret $2 = 0xffff88800b1b76c0 (gdb) p slen $3 = 64 '@' The OOB data can then be read back from userspace by dumping HMAC state. This commit fixes this by ensuring SECRETLEN cannot exceed the actual length of SECRET.

Reserved 2024-05-03 | Published 2024-05-03 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

4f4853dc1c9c1994f6f756eabdcc25374ff271d9 before dc9dbd65c803af1607484fed5da50d41dc8dd864
affected

4f4853dc1c9c1994f6f756eabdcc25374ff271d9 before f684c16971ed5e77dfa25a9ad25b5297e1f58eab
affected

4f4853dc1c9c1994f6f756eabdcc25374ff271d9 before 3df71e11a4773d775c3633c44319f7acdb89011c
affected

4f4853dc1c9c1994f6f756eabdcc25374ff271d9 before 076f2479fc5a15c4a970ca3b5e57d42ba09a31fa
affected

4f4853dc1c9c1994f6f756eabdcc25374ff271d9 before 55195563ec29f80f984237b743de0e2b6ba4d093
affected

4f4853dc1c9c1994f6f756eabdcc25374ff271d9 before 56ad3f475482bca55b0ae544031333018eb145b3
affected

4f4853dc1c9c1994f6f756eabdcc25374ff271d9 before 84a53580c5d2138c7361c7c3eea5b31827e63b35
affected

Default status
affected

4.10
affected

Any version before 4.10
unaffected

4.14.293
unaffected

4.19.258
unaffected

5.4.213
unaffected

5.10.143
unaffected

5.15.68
unaffected

5.19.9
unaffected

6.0
unaffected

References

git.kernel.org/...c/dc9dbd65c803af1607484fed5da50d41dc8dd864

git.kernel.org/...c/f684c16971ed5e77dfa25a9ad25b5297e1f58eab

git.kernel.org/...c/3df71e11a4773d775c3633c44319f7acdb89011c

git.kernel.org/...c/076f2479fc5a15c4a970ca3b5e57d42ba09a31fa

git.kernel.org/...c/55195563ec29f80f984237b743de0e2b6ba4d093

git.kernel.org/...c/56ad3f475482bca55b0ae544031333018eb145b3

git.kernel.org/...c/84a53580c5d2138c7361c7c3eea5b31827e63b35

cve.org (CVE-2022-48687)

nvd.nist.gov (CVE-2022-48687)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-48687

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.