CVE-2022-48651

Source
https://cve.org/CVERecord?id=CVE-2022-48651
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48651.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48651
Downstream
Related
Published
2024-04-28T13:00:42.929Z
Modified
2026-03-20T12:21:40.468805Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
Details

In the Linux kernel, the following vulnerability has been resolved:

ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header

If an AFPACKET socket is used to send packets through ipvlan and the default xmit function of the AFPACKET socket is changed from devqueuexmit() to packetdirectxmit() via setsockopt() with the option name of PACKETQDISCBYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following:

================================================================= UG: KASAN: slab-out-of-bounds in ipvlanxmitmodel2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: rawsend Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: printaddressdescription.constprop.0+0x1d/0x160 printreport.cold+0x4f/0x112 kasanreport+0xa3/0x130 ipvlanxmitmodel2+0xdb/0x330 [ipvlan] ipvlanstart_xmit+0x29/0xa0 [ipvlan] __devdirectxmit+0x2e2/0x380 packetdirectxmit+0x22/0x60 packetsnd+0x7c9/0xc40 socksendmsg+0x9a/0xa0 __sys_sendto+0x18a/0x230 __x64syssendto+0x74/0x90 dosyscall64+0x3b/0x90 entrySYSCALL64afterhwframe+0x63/0xcd

The root cause is: 1. packetsnd() only reset skb->macheader when sock->type is SOCKRAW and skb->protocol is not specified as in packetparse_headers()

  1. packetdirectxmit() doesn't reset skb->macheader as devqueue_xmit()

In this case, skb->macheader is 65535 when ipvlanxmitmodel2() is called. So when ipvlanxmitmodel2() gets mac header with ethhdr() which use "skb->head + skb->mac_header", out-of-bound access occurs.

This patch replaces ethhdr() with skbethhdr() in ipvlanxmitmodel2() and reset mac header in multicast to solve this out-of-bound bug.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48651.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2ad7bf3638411cb547f2823df08166c13ab04269
Fixed
e2b46cd5796f083e452fbc624f65b80328b0c1a4
Fixed
25efdbe5fe542c3063d1948cc4e98abcb57621ca
Fixed
bffcdade259c05ab3436b5fab711612093c275ef
Fixed
346e94aa4a99378592c46d6a34c72703a32bd5be
Fixed
ab4a733874ead120691e8038272d22f8444d3638
Fixed
8d06006c7eb75587d986da46c48ba9274f94e8e7
Fixed
b583e6b25bf9321c91154f6c78d2173ef12c4241
Fixed
81225b2ea161af48e093f58e8dfee6d705b16af4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48651.json"