In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits
If the offset + length goes over the ethernet + vlan header, then the length is adjusted to copy the bytes that are within the boundaries of the vlan_ethhdr scratchpad area. The remaining bytes beyond ethernet + vlan header are copied directly from the skbuff data area.
Fix incorrect arithmetic operator: subtract, not add, the size of the vlan header in case of double-tagged packets to adjust the length accordingly to address CVE-2023-0179.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53033.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53033.json"
[
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@696e1a48b1a1b01edad542a1ef293665864a4dd0",
"digest": {
"function_hash": "252678415878493625396556572419881272892",
"length": 945.0
},
"id": "CVE-2023-53033-a844225c",
"deprecated": false,
"target": {
"file": "net/netfilter/nft_payload.c",
"function": "nft_payload_copy_vlan"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@696e1a48b1a1b01edad542a1ef293665864a4dd0",
"digest": {
"line_hashes": [
"186792735818562297195019017939250632139",
"309219149537748029781007187587634801460",
"11327253293274792985824452159608966366",
"270533280628458183442545693620966478333"
],
"threshold": 0.9
},
"id": "CVE-2023-53033-b6bb32fc",
"deprecated": false,
"target": {
"file": "net/netfilter/nft_payload.c"
}
}
]