Bug 1210988 (CVE-2023-2248)

Summary: VUL-0: CVE-2023-2248: kernel: heap out-of-bounds read/write vulnerability in traffic control (QoS) subsystem
Product: [Novell Products] SUSE Security Incidents Reporter: Alexander Bergmann <abergmann>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED DUPLICATE QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: chester.lin, denis.kirjanov, mhocko, mkoutny, mkubecek, security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/364834/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-2248:7.8:(AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 1210989    

Description Alexander Bergmann 2023-05-02 06:32:52 UTC
CVE-2023-2248

A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic control (QoS) subsystem can be exploited to achieve local privilege escalation.

The qfq_change_class function does not properly limit the lmax variable which can lead to out-of-bounds read/write. If the TCA_QFQ_LMAX value is not offered through nlattr, lmax is determined by the MTU value of the network device. The MTU of the loopback device can be set up to 2^31-1 and as a result, it is possible to have an lmax value that exceeds QFQ_MIN_LMAX.

We recommend upgrading past commit 3037933448f60f9acb705997eae62013ecb81e0d.



References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2248
https://www.cve.org/CVERecord?id=CVE-2023-2248
http://www.cvedetails.com/cve/CVE-2023-2248/
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d
https://kernel.dance/3037933448f60f9acb705997eae62013ecb81e0d
Comment 6 Chester Lin 2023-05-31 04:30:43 UTC
Reassigning back to the security team since the CVE page shows that it's rejected due to the duplicate of CVE-2023-31436, which is now handled by bsc#1210940.
Comment 7 Marcus Meissner 2023-06-20 08:32:57 UTC
dup of bug 1210940.

*** This bug has been marked as a duplicate of bug 1210940 ***