a frontend splitting a packet in a way such that not all of the headers
would come in one piece. Unfortunately the logic introduced there
didn't account for the extreme case of the entire packet being split
into as many pieces as permitted by the protocol, yet still being
smaller than the area that's specially dealt with to keep all (possible)
headers together. Such an unusual packet would therefore trigger a
buffer overrun in the driver.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3623-1 | linux-5.10 security update |
Debian DLA |
DLA-3710-1 | linux security update |
Debian DSA |
DSA-5480-1 | linux security update |
Debian DSA |
DSA-5492-1 | linux security update |
Ubuntu USN |
USN-6343-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6439-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6439-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6440-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6440-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6440-3 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-6441-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6441-2 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6441-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6442-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6444-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6444-2 | Linux kernel (StarFive) vulnerabilities |
Ubuntu USN |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6446-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6446-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6446-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Using another PV network backend (e.g. the qemu based "qnic" backend) will mitigate the problem. Using a dedicated network driver domain per guest will mitigate the problem.
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 18 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split into as many pieces as permitted by the protocol, yet still being smaller than the area that's specially dealt with to keep all (possible) headers together. Such an unusual packet would therefore trigger a buffer overrun in the driver. | The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split into as many pieces as permitted by the protocol, yet still being smaller than the area that's specially dealt with to keep all (possible) headers together. Such an unusual packet would therefore trigger a buffer overrun in the driver. |
Status: PUBLISHED
Assigner: XEN
Published:
Updated: 2025-11-04T19:16:32.279Z
Reserved: 2023-06-01T10:44:17.064Z
Link: CVE-2023-34319
Updated: 2024-08-02T16:10:06.547Z
Status : Modified
Published: 2023-09-22T14:15:45.627
Modified: 2025-11-04T20:16:29.817
Link: CVE-2023-34319
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN