Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-3981-1 linux security update
Ubuntu USN Ubuntu USN USN-3384-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3384-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3385-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3385-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3386-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3386-2 Linux kernel (Trusty HWE) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T21:53:06.785Z

Reserved: 2017-10-03T00:00:00

Link: CVE-2017-1000112

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-10-05T01:29:04.477

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-1000112

cve-icon Redhat

Severity : Important

Publid Date: 2017-08-10T00:00:00Z

Links: CVE-2017-1000112 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses