First published: Sun Jul 09 2023(Updated: )
A flaw in the Linux Kernel found in netlink_dump. When the Netlink socket receives the message(sendmsg), for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message and the DUMP flag is set, it will enter the netlink_dump function for processing. When sending data to the socket multiple times, it will make sk->sk_rmem_alloc continues to accumulate, and eventually atomic_read(&sk->sk_rmem_alloc) >= sk->sk_rcvbuf will be judged as True, skipping the initialization of netlink_callback->args. Reference: <a href="https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635">https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =4.8-rc6 | |
Linux Linux kernel | =4.8-rc5 | |
Linux Linux kernel | =4.8-rc4 | |
Linux Linux kernel | =4.8-rc3 | |
Linux Linux kernel | =4.8-rc2 | |
Linux Linux kernel | =4.8-rc1 | |
Linux Linux kernel | <4.8 | |
Fedoraproject Fedora | =38 | |
redhat/kernel | <4.8 | 4.8 |
Linux Linux kernel | >=3.15<3.16.39 | |
Linux Linux kernel | >=3.17<4.4.223 | |
Linux Linux kernel | >=4.5<4.7.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3106 is a NULL pointer dereference vulnerability found in netlink_dump, which can cause a denial of service or other impact.
CVE-2023-3106 occurs when the Netlink socket receives the message for the XFRM_MSG_GETSA or XFRM_MSG_GETPOLICY type message with the DUMP flag set.
CVE-2023-3106 has a severity level of high.
To fix CVE-2023-3106, update the affected software to version 4.8 or above.
You can find more information about CVE-2023-3106 at the following references: [link1](https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635), [link2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2222176), [link3](https://access.redhat.com/security/cve/cve-2023-3106).