{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2023-52443","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-20T12:30:33.291Z","datePublished":"2024-02-22T16:13:31.154Z","dateUpdated":"2025-05-04T07:36:39.239Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:36:39.239Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n <TASK>\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n </TASK>\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org)."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["security/apparmor/policy_unpack.c"],"versions":[{"version":"04dc715e24d0820bf8740e1a1135ed61fe162bc8","lessThan":"9286ee97aa4803d99185768735011d0d65827c9e","status":"affected","versionType":"git"},{"version":"04dc715e24d0820bf8740e1a1135ed61fe162bc8","lessThan":"1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf","status":"affected","versionType":"git"},{"version":"04dc715e24d0820bf8740e1a1135ed61fe162bc8","lessThan":"5ff00408e5029d3550ee77f62dc15f1e15c47f87","status":"affected","versionType":"git"},{"version":"04dc715e24d0820bf8740e1a1135ed61fe162bc8","lessThan":"0a12db736edbb4933e4274932aeea594b5876fa4","status":"affected","versionType":"git"},{"version":"04dc715e24d0820bf8740e1a1135ed61fe162bc8","lessThan":"9d4fa5fe2b1d56662afd14915a73b4d0783ffa45","status":"affected","versionType":"git"},{"version":"04dc715e24d0820bf8740e1a1135ed61fe162bc8","lessThan":"5c0392fdafb0a2321311900be83ffa572bef8203","status":"affected","versionType":"git"},{"version":"04dc715e24d0820bf8740e1a1135ed61fe162bc8","lessThan":"77ab09b92f16c8439a948d1af489196953dc4a0e","status":"affected","versionType":"git"},{"version":"04dc715e24d0820bf8740e1a1135ed61fe162bc8","lessThan":"55a8210c9e7d21ff2644809699765796d4bfb200","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["security/apparmor/policy_unpack.c"],"versions":[{"version":"4.11","status":"affected"},{"version":"0","lessThan":"4.11","status":"unaffected","versionType":"semver"},{"version":"4.19.306","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.268","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.209","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.148","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.75","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.14","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.2","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"4.19.306"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"5.4.268"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"5.10.209"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"5.15.148"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.1.75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.6.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.7.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e"},{"url":"https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf"},{"url":"https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87"},{"url":"https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4"},{"url":"https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45"},{"url":"https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203"},{"url":"https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e"},{"url":"https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200"}],"title":"apparmor: avoid crash when parsed profile name is empty","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52443","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-02-22T18:29:41.510350Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-05T17:21:01.497Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:55:41.517Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","tags":["x_transferred"]}]}]},"dataVersion":"5.1"}