CVE-2023-52574

Source
https://cve.org/CVERecord?id=CVE-2023-52574
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52574.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52574
Downstream
Related
Published
2024-03-02T21:59:43.271Z
Modified
2026-04-11T12:46:32.844272Z
Summary
team: fix null-ptr-deref when team device type is changed
Details

In the Linux kernel, the following vulnerability has been resolved:

team: fix null-ptr-deref when team device type is changed

Get a null-ptr-deref bug as follows with reproducer [1].

BUG: kernel NULL pointer dereference, address: 0000000000000228 ... RIP: 0010:vlandevhard_header+0x35/0x140 [8021q] ... Call Trace: <TASK> ? __die+0x24/0x70 ? pagefaultoops+0x82/0x150 ? excpagefault+0x69/0x150 ? asmexcpagefault+0x26/0x30 ? vlandevhardheader+0x35/0x140 [8021q] ? vlandevhardheader+0x8e/0x140 [8021q] neighconnectedoutput+0xb2/0x100 ip6finishoutput2+0x1cb/0x520 ? nfhookslow+0x43/0xc0 ? ip6mtu+0x46/0x80 ip6finishoutput+0x2a/0xb0 mldsendpack+0x18f/0x250 mldifcwork+0x39/0x160 processonework+0x1e6/0x3f0 workerthread+0x4d/0x2f0 ? __pfxworkerthread+0x10/0x10 kthread+0xe5/0x120 ? __pfxkthread+0x10/0x10 retfrom_fork+0x34/0x50 ? __pfxkthread+0x10/0x10 retfromforkasm+0x1b/0x30

[1] $ teamd -t team0 -d -c '{"runner": {"name": "loadbalance"}}' $ ip link add name t-dummy type dummy $ ip link add link t-dummy name t-dummy.100 type vlan id 100 $ ip link add name t-nlmon type nlmon $ ip link set t-nlmon master team0 $ ip link set t-nlmon nomaster $ ip link set t-dummy up $ ip link set team0 up $ ip link set t-dummy.100 down $ ip link set t-dummy.100 master team0

When enslave a vlan device to team device and team device type is changed from non-ether to ether, headerops of team device is changed to vlanheaderops. That is incorrect and will trigger null-ptr-deref for vlan->realdev in vlandevhard_header() because team device is not a vlan device.

Cache ethheaderops in teamsetup(), then assign cached headerops to header_ops of team net device when its type is changed from non-ether to ether to fix the bug.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52574.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1d76efe1577b4323609b1bcbfafa8b731eda071a
Fixed
1779eb51b9cc628cee551f252701a85a2a50a457
Fixed
a7fb47b9711101d2405b0eb1276fb1f9b9b270c7
Fixed
c5f6478686bb45f453031594ae19b6c9723a780d
Fixed
b44dd92e2afd89eb6e9d27616858e72a67bdc1a7
Fixed
cd05eec2ee0cc396813a32ef675634e403748255
Fixed
2f0acb0736ecc3eb85dc80ad2790d634dcb10b58
Fixed
cac50d9f5d876be32cb9aa21c74018468900284d
Fixed
492032760127251e5540a5716a70996bacf2a3fd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52574.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.7.0
Fixed
4.14.327
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.296
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.258
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.198
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.134
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.56
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52574.json"