CVE-2022-3643

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm5780:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:19

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html - () http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -
References () http://www.openwall.com/lists/oss-security/2022/12/07/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/12/07/2 - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory
References () https://xenbits.xenproject.org/xsa/advisory-423.txt - Vendor Advisory () https://xenbits.xenproject.org/xsa/advisory-423.txt - Vendor Advisory
Summary
  • (es) Los invitados pueden activar el reinicio, cancelación o bloqueo de la interfaz NIC a través de netback. Es posible que un invitado active un reinicio, cancelación o bloqueo de la interfaz NIC en un servidor de red basado en Linux enviando ciertos tipos de paquetes. Parece ser una suposición (¿no escrita?) en el resto de la pila de red de Linux de que todos los encabezados de protocolo de paquetes están contenidos dentro de la sección lineal del SKB y que algunas NIC se comportan mal si este no es el caso. Se ha informado que esto ocurre con Cisco (enic) y Broadcom NetXtrem II BCM5780 (bnx2x), aunque también puede ser un problema con otras NIC/controladores. En caso de que el frontend envíe solicitudes con encabezados divididos, netback reenviará aquellas que violen la suposición mencionada anteriormente al núcleo de la red, lo que resultará en dicho mal comportamiento.

29 Nov 2023, 15:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -

Information

Published : 2022-12-07 01:15

Updated : 2024-11-21 07:19


NVD link : CVE-2022-3643

Mitre link : CVE-2022-3643

CVE.ORG link : CVE-2022-3643


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel

broadcom

  • bcm5780
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')