Lucene search

K
redhatcveRedhat.comRH:CVE-2023-52906
HistoryAug 21, 2024 - 6:10 p.m.

CVE-2023-52906

2024-08-2118:10:16
redhat.com
access.redhat.com
1
linux kernel
vulnerability
net/sched: act_mpls
nla_u32 attribute
nla_validate_function
nla_get_range_unsigned

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0

Percentile

5.1%

A flaw was found in the Linux Kernel. The ‘TCA_MPLS_LABEL’ attribute is of the ‘NLA_U32’ type, but has a validation type of ‘NLA_VALIDATE_FUNCTION’. This is an invalid combination according to ‘struct nla_policy’, which can trigger the nla_get_range_unsigned() warning when validation of the attribute fails. Despite being ‘NLA_U32’ type, the associated ‘min’/‘max’ fields in the policy are negative as they are aliased by the ‘validate’ field. To mitigate, change the attribute type to ‘NLA_BINARY’, and move the length validation to the validation function.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0

Percentile

5.1%