The fix for XSA-423 added logic to Linux'es netback driver to deal with
a frontend splitting a packet in a way such that not all of the headers
would come in one piece. Unfortunately the logic introduced there
didn't account for the extreme case of the entire packet being split
into as many pieces as permitted by the protocol, yet still being
smaller than the area that's specially dealt with to keep all (possible)
headers together. Such an unusual packet would therefore trigger a
buffer overrun in the driver.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240202-0001/ | Third Party Advisory |
https://xenbits.xenproject.org/xsa/advisory-432.html | Mitigation Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: XEN
Published: 2023-09-22T13:34:44.424Z
Updated: 2023-10-26T09:41:01.271Z
Reserved: 2023-06-01T10:44:17.064Z
Link: CVE-2023-34319
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-09-22T14:15:45.627
Modified: 2024-06-26T15:54:52.513
Link: CVE-2023-34319
JSON object: View
Redhat Information
No data.
CWE