Skip to main content

CVE-2023-52845: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52845cvecve-2023-52845
Published: Tue May 21 2024 (05/21/2024, 15:31:43 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING syzbot reported the following uninit-value access issue [1]: ===================================================== BUG: KMSAN: uninit-value in strlen lib/string.c:418 [inline] BUG: KMSAN: uninit-value in strstr+0xb8/0x2f0 lib/string.c:756 strlen lib/string.c:418 [inline] strstr+0xb8/0x2f0 lib/string.c:756 tipc_nl_node_reset_link_stats+0x3ea/0xb50 net/tipc/node.c:2595 genl_family_rcv_msg_doit net/netlink/genetlink.c:971 [inline] genl_family_rcv_msg net/netlink/genetlink.c:1051 [inline] genl_rcv_msg+0x11ec/0x1290 net/netlink/genetlink.c:1066 netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2545 genl_rcv+0x40/0x60 net/netlink/genetlink.c:1075 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline] netlink_unicast+0xf47/0x1250 net/netlink/af_netlink.c:1368 netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910 sock_sendmsg_nosec net/socket.c:730 [inline] sock_sendmsg net/socket.c:753 [inline] ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595 __sys_sendmsg net/socket.c:2624 [inline] __do_sys_sendmsg net/socket.c:2633 [inline] __se_sys_sendmsg net/socket.c:2631 [inline] __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Uninit was created at: slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767 slab_alloc_node mm/slub.c:3478 [inline] kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559 __alloc_skb+0x318/0x740 net/core/skbuff.c:650 alloc_skb include/linux/skbuff.h:1286 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1214 [inline] netlink_sendmsg+0xb34/0x13d0 net/netlink/af_netlink.c:1885 sock_sendmsg_nosec net/socket.c:730 [inline] sock_sendmsg net/socket.c:753 [inline] ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595 __sys_sendmsg net/socket.c:2624 [inline] __do_sys_sendmsg net/socket.c:2633 [inline] __se_sys_sendmsg net/socket.c:2631 [inline] __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd TIPC bearer-related names including link names must be null-terminated strings. If a link name which is not null-terminated is passed through netlink, strstr() and similar functions can cause buffer overrun. This causes the above issue. This patch changes the nla_policy for bearer-related names from NLA_STRING to NLA_NUL_STRING. This resolves the issue by ensuring that only null-terminated strings are accepted as bearer-related names. syzbot reported similar uninit-value issue related to bearer names [2]. The root cause of this issue is that a non-null-terminated bearer name was passed. This patch also resolved this issue.

AI-Powered Analysis

AILast updated: 07/01/2025, 07:42:30 UTC

Technical Analysis

CVE-2023-52845 is a vulnerability identified in the Linux kernel's Transparent Inter-Process Communication (TIPC) subsystem, specifically related to the handling of bearer-related names passed through netlink interfaces. The root cause stems from the acceptance of non-null-terminated strings for bearer names, which are used to identify communication links within TIPC. The vulnerability arises because functions such as strlen() and strstr() are called on these bearer names without proper null-termination checks, leading to uninitialized memory reads and potential buffer overruns. The issue was detected by syzbot, a kernel fuzzing tool, which reported uninitialized value accesses in string handling functions within the kernel's string.c library. The vulnerability is triggered when a non-null-terminated bearer name is passed via netlink, causing the kernel to process potentially malformed strings. This can lead to memory corruption or information leakage. The patch for this vulnerability changes the netlink attribute policy (nla_policy) for bearer-related names from NLA_STRING to NLA_NUL_STRING, enforcing that only null-terminated strings are accepted, thereby preventing the buffer overrun and uninitialized memory access issues. The vulnerability affects multiple versions of the Linux kernel identified by the commit hash 0655f6a8635b1b66f2434d5556b1044c14b1ccaf. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. However, the technical details indicate a memory safety issue that could be leveraged under certain conditions to compromise kernel stability or leak sensitive information.

Potential Impact

For European organizations, the impact of CVE-2023-52845 can be significant given the widespread use of Linux in enterprise servers, cloud infrastructure, and embedded systems. Exploitation of this vulnerability could lead to kernel memory corruption, potentially causing system crashes (denial of service) or information disclosure. In environments where Linux servers handle sensitive data or critical infrastructure, such as financial institutions, telecommunications, or government agencies, this vulnerability could undermine system integrity and confidentiality. Additionally, since TIPC is often used in clustered or distributed systems for inter-node communication, exploitation could disrupt cluster operations or inter-process communications, affecting availability and reliability of services. Although exploitation requires sending crafted netlink messages, which may require local access or elevated privileges, the vulnerability could be leveraged by attackers who have gained initial footholds to escalate privileges or destabilize systems. The lack of known exploits suggests limited immediate risk, but the potential for future exploitation remains, especially in targeted attacks against high-value European infrastructure or enterprises relying heavily on Linux-based systems.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that change the nla_policy for bearer-related names to enforce null-terminated strings. System administrators should: 1) Identify and inventory Linux systems running vulnerable kernel versions matching the affected commit hash. 2) Deploy kernel updates from trusted sources or vendor-provided security patches promptly. 3) Restrict access to netlink interfaces to trusted users and processes, minimizing the risk of crafted netlink messages being sent by unprivileged users. 4) Implement kernel hardening measures such as Kernel Address Space Layout Randomization (KASLR) and Kernel Memory Sanitizer (KMSAN) where possible to detect and mitigate memory corruption issues. 5) Monitor system logs and netlink activity for anomalous or unexpected messages that could indicate exploitation attempts. 6) For critical systems, consider isolating or segmenting Linux hosts to limit lateral movement if exploitation occurs. 7) Engage in regular vulnerability scanning and penetration testing to detect potential exploitation vectors related to netlink communication. These steps go beyond generic advice by focusing on controlling access to netlink and leveraging kernel hardening features specific to memory safety.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.254Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe7706

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 7:42:30 AM

Last updated: 8/20/2025, 6:32:15 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats