CVE-2023-52700

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52700
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52700.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52700
Downstream
Related
Published
2024-05-21T15:22:50.702Z
Modified
2025-11-27T02:34:02.625645Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
tipc: fix kernel warning when sending SYN message
Details

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix kernel warning when sending SYN message

When sending a SYN message, this kernel stack trace is observed:

... [ 13.396352] RIP: 0010:copyfromiter+0xb4/0x550 ... [ 13.398494] Call Trace: [ 13.398630] <TASK> [ 13.398630] ? _allocskb+0xed/0x1a0 [ 13.398630] tipcmsgbuild+0x12c/0x670 [tipc] [ 13.398630] ? shmemaddtopagecache.isra.71+0x151/0x290 [ 13.398630] _tipcsendmsg+0x2d1/0x710 [tipc] [ 13.398630] ? tipcconnect+0x1d9/0x230 [tipc] [ 13.398630] ? _localbhenableip+0x37/0x80 [ 13.398630] tipcconnect+0x1d9/0x230 [tipc] [ 13.398630] ? _sysconnect+0x9f/0xd0 [ 13.398630] _sysconnect+0x9f/0xd0 [ 13.398630] ? preemptcountadd+0x4d/0xa0 [ 13.398630] ? fpregsassertstateconsistent+0x22/0x50 [ 13.398630] _x64sysconnect+0x16/0x20 [ 13.398630] dosyscall64+0x42/0x90 [ 13.398630] entrySYSCALL64after_hwframe+0x63/0xcd

It is because commit a41dad905e5a ("iov_iter: saner checks for attempt to copy to/from iterator") has introduced sanity check for copying from/to iov iterator. Lacking of copy direction from the iterator viewpoint would lead to kernel stack trace like above.

This commit fixes this issue by initializing the iov iterator with the correct copy direction when sending SYN or ACK without data.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2023/52xxx/CVE-2023-52700.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f25dcc7687d42a72de18aa41b04990a24c9e77c7
Fixed
54b6082aec178f16ad6d193b4ecdc9c4823d9a32
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f25dcc7687d42a72de18aa41b04990a24c9e77c7
Fixed
11a4d6f67cf55883dc78e31c247d1903ed7feccc

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0
Fixed
6.1.13