CVE-2023-52996

In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->metrics[type - 1]; @type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*

History

30 Oct 2025, 16:40

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/5e9398a26a92fc402d82ce1f97cc67d832527da0 - () https://git.kernel.org/stable/c/5e9398a26a92fc402d82ce1f97cc67d832527da0 - Patch
References () https://git.kernel.org/stable/c/7f9828fb1f688210e681268490576f0ca65c322a - () https://git.kernel.org/stable/c/7f9828fb1f688210e681268490576f0ca65c322a - Patch
References () https://git.kernel.org/stable/c/8f0eb24f1a7a60ce635f0d757a46f1a37a4d467d - () https://git.kernel.org/stable/c/8f0eb24f1a7a60ce635f0d757a46f1a37a4d467d - Patch
References () https://git.kernel.org/stable/c/ca3cf947760de050d558293002ad3e7f4b8745d2 - () https://git.kernel.org/stable/c/ca3cf947760de050d558293002ad3e7f4b8745d2 - Patch
References () https://git.kernel.org/stable/c/f9753ebd61be2d957b5504cbd3fd719674f05b7a - () https://git.kernel.org/stable/c/f9753ebd61be2d957b5504cbd3fd719674f05b7a - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: evitar un potencial gadget spectre v1 en fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->metrics[type - 1]; @type se utiliza como un índice de matriz, debemos evitar la especulación de la CPU o corremos el riesgo de filtrar el contenido de la memoria del kernel.

27 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 17:15

Updated : 2025-10-30 16:40


NVD link : CVE-2023-52996

Mitre link : CVE-2023-52996

CVE.ORG link : CVE-2023-52996


JSON object : View

Products Affected

linux

  • linux_kernel