Bugzilla – Bug 1213060
VUL-1: CVE-2023-43771: nqptp: NULL pointer dereference caused by invalid control port message
Last modified: 2024-04-15 07:18:09 UTC
+++ This bug was initially created as a clone of Bug #1212951 +++ OBS devel project: network:time/nqptp Upstream: https://github.com/mikebrady/nqptp Unprivileged users can crash the nqptp daemon by sending an invalid packet to the control port. Any payload not containing a space character (0x20) will work. Steps to reproduce: > nc -w0 -u 127.0.0.1 9000 <<< "" > $ ./nqptp > AddressSanitizer:DEADLYSIGNAL > ================================================================= > ==7787==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f19d7ac57cd bp 0x7ffe74976fe0 sp 0x7ffe74976770 T0) > ==7787==The signal is caused by a READ memory access. > ==7787==Hint: address points to the zero page. > #0 0x7f19d7ac57cd (/lib64/libasan.so.8+0xc57cd) (BuildId: 44194dcf14c212b57346030492309d59d5379ae1) > #1 0x406f11 in handle_control_port_messages /home/wfrisch/audit/bsc-1212951-nqptp/nqptp/nqptp-message-handlers.c:72 > #2 0x403da3 in main /home/wfrisch/audit/bsc-1212951-nqptp/nqptp/nqptp.c:339 > #3 0x7f19d782abaf in __libc_start_call_main (/lib64/libc.so.6+0x27baf) (BuildId: 1390809fc3a065502adfa6735d294c2c86aebe4d) > #4 0x7f19d782ac78 in __libc_start_main_alias_1 (/lib64/libc.so.6+0x27c78) (BuildId: 1390809fc3a065502adfa6735d294c2c86aebe4d) > #5 0x402514 in _start ../sysdeps/x86_64/start.S:115 > > AddressSanitizer can not provide additional info. > SUMMARY: AddressSanitizer: SEGV (/lib64/libasan.so.8+0xc57cd) (BuildId: 44194dcf14c212b57346030492309d59d5379ae1) > ==7787==ABORTING CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Forwarded to upstream
2023-09-01: Upstreamed confirmed they're working on this.
Fixed by upstream: https://github.com/mikebrady/nqptp/releases/tag/1.2.3
*** Bug 1215614 has been marked as a duplicate of this bug. ***
(In reply to Hu from comment #1) > Affected: > - openSUSE:Factory/nqptp 1.2.1