In the Linux kernel, the following vulnerability has been resolved:
ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()
if (!type)
		continue;
	if (type > RTAX_MAX)
		return -EINVAL;
	...
	metrics[type - 1] = val;
@type being used as an array index, we need to prevent
cpu speculation or risk leaking kernel memory content.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    30 Oct 2025, 16:40
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://git.kernel.org/stable/c/1d1d63b612801b3f0a39b7d4467cad0abd60e5c8 - Patch | |
| References | () https://git.kernel.org/stable/c/34c6142f0df9cd75cba5a7aa9df0960d2854b415 - Patch | |
| References | () https://git.kernel.org/stable/c/6850fe301d015a7d2012d1de8caf43dafb7cc2f6 - Patch | |
| References | () https://git.kernel.org/stable/c/746db9ec1e672eee13965625ddac0d97e16fa20c - Patch | |
| References | () https://git.kernel.org/stable/c/d50e7348b44f1e046121ff5be01b7fb6978a1149 - Patch | |
| References | () https://git.kernel.org/stable/c/ef050cf5fb70d995a0d03244e25179b7c66a924a - Patch | |
| CWE | NVD-CWE-noinfo | |
| First Time | Linux linux Kernel Linux | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Summary | 
 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.5 | 
27 Mar 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-27 17:15
Updated : 2025-10-30 16:40
NVD link : CVE-2023-52997
Mitre link : CVE-2023-52997
CVE.ORG link : CVE-2023-52997
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                