Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2023-52846
HistoryMay 21, 2024 - 3:31 p.m.

CVE-2023-52846 hsr: Prevent use after free in prp_create_tagged_frame()

2024-05-2115:31:43
Linux
github.com
2
linux kernel
hsr
prp_create_tagged_frame
use after free
vulnerability

AI Score

6.9

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

hsr: Prevent use after free in prp_create_tagged_frame()

The prp_fill_rct() function can fail. In that situation, it frees the
skb and returns NULL. Meanwhile on the success path, it returns the
original skb. So it’s straight forward to fix bug by using the returned
value.

CNA Affected

[
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "451d8123f897",
        "lessThan": "ddf4e04e946a",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "451d8123f897",
        "lessThan": "a1a485e45d24",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "451d8123f897",
        "lessThan": "6086258bd5ea",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "451d8123f897",
        "lessThan": "1787b9f0729d",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "451d8123f897",
        "lessThan": "d103fb672690",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "451d8123f897",
        "lessThan": "876f8ab52363",
        "versionType": "git"
      }
    ],
    "programFiles": [
      "net/hsr/hsr_forward.c"
    ],
    "defaultStatus": "unaffected"
  },
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "5.9"
      },
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "5.9",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "5.10.201",
        "versionType": "custom",
        "lessThanOrEqual": "5.10.*"
      },
      {
        "status": "unaffected",
        "version": "5.15.139",
        "versionType": "custom",
        "lessThanOrEqual": "5.15.*"
      },
      {
        "status": "unaffected",
        "version": "6.1.63",
        "versionType": "custom",
        "lessThanOrEqual": "6.1.*"
      },
      {
        "status": "unaffected",
        "version": "6.5.12",
        "versionType": "custom",
        "lessThanOrEqual": "6.5.*"
      },
      {
        "status": "unaffected",
        "version": "6.6.2",
        "versionType": "custom",
        "lessThanOrEqual": "6.6.*"
      },
      {
        "status": "unaffected",
        "version": "6.7",
        "versionType": "original_commit_for_fix",
        "lessThanOrEqual": "*"
      }
    ],
    "programFiles": [
      "net/hsr/hsr_forward.c"
    ],
    "defaultStatus": "affected"
  }
]

AI Score

6.9

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial