In the Linux kernel, the following vulnerability has been resolved:net: fix geneve_opt length integer overflowstruct geneve_opt uses 5 bit length for each single option, whichmeans every vary size option should be smaller than 128 bytes.However, all current related Netlink policies cannot promise thislength condition and the attacker can exploit a exact 128-byte sizeoption to *fake* a zero length option and confuse the parsing logic,further achieve heap out-of-bounds read.One example crash log is like below:[ 3.905425] ==================================================================[ 3.905925] BUG: KASAN: slab-out-of-bounds in nla_put+0xa9/0xe0[ 3.906255] Read of size 124 at addr ffff888005f291cc by task poc/177[ 3.906646][ 3.906775] CPU: 0 PID: 177 Comm: poc-oob-read Not tainted 6.1.132 #1[ 3.907131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014[ 3.907784] Call Trace:[ 3.907925]
No PoCs from references.
- https://github.com/runwhen-contrib/helm-charts
- https://github.com/w4zu/Debian_security